Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
Most information systems are secured at minimum by some form of password protection. For various reasons a password may be unavailable, requiring some form of password recovery procedure. One such procedure is software-based automated password recovery, where a program attempts to log into a system by repeatedly trying different password combinations. At the core of such software is a password generator. This article describes the basic iterative and recursive algorithms for generating all possible passwords of a given length, which is commonly referred to as brute-force password generation. The paper ends with a discussion of alternative password recovery procedures one should attempt before brute-force password recovery.
References
Brown, A. S., Bracken, E., Zoccoli, S., & Douglas, K. (2004, September). Generating and Remembering Passwords. Applied Cognitive Psychology, 18(6), 641-651.
Florencio, D., & Herley, C. (2007). A Large-Scale Study of Web Password Habits. In: Proceedings of the 16th International World Wide Web Conference (pp. 657-665). Banff, Alberta: University of Calgary.
Morris, R., & Thompson, K. (1979, November). Password Security: A Case History. Communications of the ACM, 22(11), 594-597.
Recommended Citation
Flor, Nick V. and Shannon, Haile
(2011)
"Technology Corner: Brute Force Password Generation -- Basic Iterative and Recursive Algorithms,"
Journal of Digital Forensics, Security and Law: Vol. 6
, Article 7.
DOI: https://doi.org/10.15394/jdfsl.2011.1102
Available at:
https://commons.erau.edu/jdfsl/vol6/iss3/7
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons