World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Security Analysis and Improvements to the Psychopass Method., Vol. 15

By Cipresso, Pietro

Click here to view

Book Id: WPLBN0004437619
Format Type: PDF eBook :
File Size:
Reproduction Date: 2013-08-13

Title: Security Analysis and Improvements to the Psychopass Method., Vol. 15  
Author: Cipresso, Pietro
Volume: Vol. 15
Language: English
Subject: Pdf.Yt, Computer Graphics
Collections:
Historic
Publication Date:
2013-08-13
Publisher:

Citation

APA MLA Chicago

Ivan, R. (2013-08-13). Security Analysis and Improvements to the Psychopass Method., Vol. 15. Retrieved from http://www.ebooklibrary.org/


Description
Description: This article is from Journal of Medical Internet Research, volume 15.

Abstract

Background: In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. Objective: To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. Methods: We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. Results: The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. Conclusions: The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength.


 

Click To View

Additional Books


  • PLG : a model for high resolution, three... (by )
  • Development report: Automatic System Tes... (by )
  • An all-carbon radiating nozzle for long ... (by )
  • Use of the 4D-Global Reference Atmospher... (by )
  • Impactite and pseudotachylite from Roter... (by )
  • Radiation hardness of Efratom M-100 rubi... (by )
  • On-orbit free molecular flow aerodynamic... (by )
  • Maghlivnishnulebiani Warsaw Method and I... (by )
  • Development of a quiet supersonic wind t... (by )
  • The development of a land use inventory ... (by )
  • Supersonic jet shock noise reduction (by )
  • Strategies for Converting to New Technol... (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.