1: Zipf’s Law in Passwords 基于密码的身份验证仍然是互联网上用户身份验证的主要机制。尽管它无处不在,但这种身份验证伴随着生成密码的困境,这对于强大的攻击者来说很难破解,但普通用户很容易记住。 The diversity of password strength meters and rules brings about an enormous variety of requirements between...
As shown in Figs.2(a) and (b) and also in [36], one undesirable feature of thePDF-Zipfmodel is that, it can not well capture the distribution of the first few most popular passwords (e.g., passwords with rank less than 1000).Footnote1We have tried various means to adjust thePDF-...
Zipf's Law in Passwords 来自 科研支点 喜欢 0 阅读量: 149 作者:WSM Ding,IEEE,G Jian,X Huang,WSM Ping,IEEE 摘要: Despite three decades of intensive research efforts, it remains an open question as to what is the underlying distribution of user-generated passwords. In this paper, we make ...
Zipf's lawPassword distributionPassword policyIranian users passwordSECURITYINFORMATIONSELFTextual passwords are one of the most common methods of authentication and an important factor in systems security. Knowing the correct distribution of users' passwords can play an important role in defining password ...
On the Implications of Zipf 's Law in Passwords Ding Wang1 and Ping Wang1,2(B) 1 School of EECS, Peking University, Beijing 100871, China {wangdingg,pwang}@pku.edu.cn 2 School of Software and Microelectronics, Peking University, Beijing 100260, China Abstract. Textual passwords are ...
The paper also examines the existence of Zipf's law on Iranian passwords as the most well-known distribution for passwords. Password analysis of Iranian users shows that the popular password length between Iranian users and users of other countries is not much different, but in terms of the ...