A Survey of Password Mechanisms: Weaknesses and Potential Improvements, Part 2
Author(s): David L. Jobusch, Arthur E. Oldehoeft

Date: November 1989
Publication: Computers and Security, Volume 8, Number 9
Page(s): 675 - 689
Publisher: Elsevier
Source 1: http://dx.doi.org/10.1016/0167-4048(89)90006-0 - Subscription or payment required

Abstract or Summary:
While research continues on more sophisticated methods of authentication, password mechanisms remain the predominant method of identifying computer system users. In this paper, the goals of authentication are reviewed, and the strengths and vulnerabilities of password mechanisms are discussed. The 4.3 Berkeley Software Distribution (4.3BSD) version of UNIX is used as a case study throughout the paper. Several recommendations are presented for the improvement of password mechanisms. In particular, a simple extension of the UNIX password system is described that permits the use of pass-phrases. Part 2/2.



Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.

<-- Back to Authentication Research Paper Index





[Home] [About Us] [News] [Research]

Copyright © 2016 PasswordResearch.com