We used several different dictionaries for this purpose. Table 1 presents their list, sizes, and the number of passwords found in each of them. It should be noted that some dictionaries—and therefore, the passwords found in them—overlap, because we wanted to measure the effectiveness of each...