Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multidigit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs.
References
Ponstein, J. (1966, May). Self-avoiding paths and the adjacency matrix of a graph. SIAM Journal on Applied Mathematics, 14(3), 600-609.
Recommended Citation
Kessler, Gary C.
(2013)
"Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory,"
Journal of Digital Forensics, Security and Law: Vol. 8
, Article 4.
DOI: https://doi.org/10.15394/jdfsl.2013.1156
Available at:
https://commons.erau.edu/jdfsl/vol8/iss4/4
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons