Talk:Dictionary attack: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris |
imported>Howard C. Berkowitz |
||
Line 6: | Line 6: | ||
: I think eventually we need something at [[User authentication]]. There are relevant bits here, at [[Cryptography#One-way_encryption]] and likely elsewhere, but they need to be tied together and other methods — tokens, one-time passwords, smartcards, biometrics, ... — covered. [[User:Sandy Harris|Sandy Harris]] 16:28, 27 July 2010 (UTC) | : I think eventually we need something at [[User authentication]]. There are relevant bits here, at [[Cryptography#One-way_encryption]] and likely elsewhere, but they need to be tied together and other methods — tokens, one-time passwords, smartcards, biometrics, ... — covered. [[User:Sandy Harris|Sandy Harris]] 16:28, 27 July 2010 (UTC) | ||
==Other dictionary attacks== | |||
You are aware of the efficacy of the unabridged dictionary attack on cockroaches? [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 18:54, 15 August 2010 (UTC) |
Latest revision as of 12:54, 15 August 2010
Password selection; authentication; thinking aloud
Thinking out loud here, I wonder if there is an article inside this on password selection, for which this gives some of the reasons -- bad passwords are also subject to social engineering. It might be worth mentioning that reusable passwords aren't the ideal solution for strong authentication; there's no dictionary attack against a security token. Howard C. Berkowitz 15:05, 27 July 2010 (UTC)
- I think eventually we need something at User authentication. There are relevant bits here, at Cryptography#One-way_encryption and likely elsewhere, but they need to be tied together and other methods — tokens, one-time passwords, smartcards, biometrics, ... — covered. Sandy Harris 16:28, 27 July 2010 (UTC)
Other dictionary attacks
You are aware of the efficacy of the unabridged dictionary attack on cockroaches? Howard C. Berkowitz 18:54, 15 August 2010 (UTC)