期刊文献+

基于熵的密码强度估计 被引量:1

Estimating Password Strength Based on Entropy
原文传递
导出
摘要 密码是电子认证的基础,密码的保护以及密码强度或抗破解能力对受保护信息或信息系统的安全至关重要。目前还没有一个准确定义密码强度的方法,基于熵的概念,借助猜测熵和最小熵对密码强度进行大致估计,将对密码的选择具有一定的指导作用。本文介绍了基于熵对密码的强度进行估计的方法。 The password is the basis of electronic authentication.It's essential that password protection and password strength or anti-cracking capacity for the security of protected information or information systems.There is not an accurate method to define the password strength.Based on the concept of entropy,estimating roughly the password strength by using of guessing entropy and min-entropy,will has a guiding role for password selection.This article describes a method to estimate the strength of a password based on entropy.
作者 严霄凤
出处 《网络安全技术与应用》 2012年第11期36-38,共3页 Network Security Technology & Application
基金 国家发展改革委信息安全专项项目(项目名称:电子认证服务风险评估与验证专业化服务项目)资助
关键词 电子认证 密码 密码熵 Electronic Authentication Password Password Entropy Entropy
  • 相关文献

参考文献2

二级参考文献1

共引文献41

同被引文献13

  • 1Nandakumar K,Jain A K, Pankanti S. Fingerprint-based Fuzzy Vault : Implementation and Performance [ J ] IEEE Transactions on Information Forensics and Security, 2007,2(4) :744-757.
  • 2Monrose F, Reiter M K, Li Q, et al. Cryptographic Key Generation from Voice[ C]//Proceedings of IEEE Sym- posium Security and Privacy. Sacramento, USA: IEEE Press,2001:202-213.
  • 3Chen C,Veldhuis R N J,Kevenaar T A M,et al. Multi-bits Biometric String Generation Based on the Likelihood Ratio[C]//Proceedings of IEEE International Conferenceon Biometrics : Theory, Applications, and System. Washington D. C. , USA :IEEE Press,2007 : 1-6.
  • 4Chen C ,Veldhuis R N J, Kevenaar T A M, et al. Biometric Quantization Through Detection Rate Optimized Bit Allocation[J ]. EURASIP Journal on Advances in Signal Processing,2009,3 ( 1 ) : 1 - 16.
  • 5Sheng Weiguo,Howells G, Fairhurst M, et al. Reliable and Secure Encryption Key Generation from Fingerprints [ J ]. Information Management & Computer Security, 2012, 20( 3 ) :207-221.
  • 6Chang Y J,Zhang W, Chen T. Biometric-based Crypto- graphic Key Generation [ C ]//Proceedings of IEEE International Conference on Multimedia and Expo. Copenhagen, Denmark : IEEE Press ,2004:2203-2206.
  • 7Lim M H,Teoh A B J,Toh K A. An Efficient Dynamic Reliability-dependent Bit Allocation for Biometric Discretization [ J ] Pattern Recognition, 2011,45 ( 5 ) : 1960-1971.
  • 8Denier J J, Gon V, Thuring J. The Guiding of Human Writing Movements [ J] Kybemetik, 1965,4 ( 3 ) : 145- 148.
  • 9Vielhauer C, Steinmetz R. Handwriting : Feature Correla- tion Analysis for Biometric Hashes [J]. EURASIP Journal on Applied Signal Processing, 2004,8 ( 4 ) : 542- 558.
  • 10Yeung D Y, Chang H, Xiong Y, et al. SVC2004 : First International Signature Verification Competition [ C ]// Proceedings of Conference on Lecture Notes in Com- puter Science. Berlin, Germany : Springer, 2004,5 ( 3 ) : 16-22.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部