Talk:Dictionary attack: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (→Password selection; authentication; thinking aloud: new section) |
imported>Sandy Harris |
||
Line 4: | Line 4: | ||
Thinking out loud here, I wonder if there is an article inside this on password selection, for which this gives some of the reasons -- bad passwords are also subject to social engineering. It might be worth mentioning that reusable passwords aren't the ideal solution for strong authentication; there's no dictionary attack against a security token. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 15:05, 27 July 2010 (UTC) | Thinking out loud here, I wonder if there is an article inside this on password selection, for which this gives some of the reasons -- bad passwords are also subject to social engineering. It might be worth mentioning that reusable passwords aren't the ideal solution for strong authentication; there's no dictionary attack against a security token. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 15:05, 27 July 2010 (UTC) | ||
: I think eventually we need something at [[User authentication]]. There are relevant bits here, at [[Cryptography#One-way_encryption]] and likely elsewhere, but they need to be tied together and other methods — tokens, one-time passwords, smartcards, biometrics, ... — covered. [[User:Sandy Harris|Sandy Harris]] 16:28, 27 July 2010 (UTC) |
Revision as of 11:28, 27 July 2010
Password selection; authentication; thinking aloud
Thinking out loud here, I wonder if there is an article inside this on password selection, for which this gives some of the reasons -- bad passwords are also subject to social engineering. It might be worth mentioning that reusable passwords aren't the ideal solution for strong authentication; there's no dictionary attack against a security token. Howard C. Berkowitz 15:05, 27 July 2010 (UTC)
- I think eventually we need something at User authentication. There are relevant bits here, at Cryptography#One-way_encryption and likely elsewhere, but they need to be tied together and other methods — tokens, one-time passwords, smartcards, biometrics, ... — covered. Sandy Harris 16:28, 27 July 2010 (UTC)