scispace - formally typeset
Search or ask a question

Showing papers on "Password strength published in 1985"


Patent
14 Jan 1985
TL;DR: In this article, a computer access system includes a password generator (10) and a lock computer (50) connected to receive passwords generated by the password generator and grant access to a host computer (52) when a password from the generator matches a password separately generated by a lock machine (50).
Abstract: A computer access system includes a password generator (10) and an lock computer (50) connected to receive passwords generated by the password generator and grant access to a host computer (52) when a password from the password generator (10) matches a password separately generated by the lock computer (50). The password generator (10) and the lock computer (50) have corresponding pseudo-random number sequences stored in memories (26 and 90). The password generator (10) and the lock computer (50) have synchronized clocks (30 and 84), which define time intervals. During a given time interval, entry of a personal identification number in password generator (10) will cause the password generator (10) to generate a unique password from the random number sequence in memory (26) and time interval information from clock (30). The user transmits the so-generated password to the lock computer (50), which independently generates a comparison password from the corresponding pseudo-random number sequence stored in memory (90), and the time interval defined by clock (84). If the passwords match, access to computer (52) is granted by the lock computer (50). Since the valid passwords change with each time interval, subsequent use of an intercepted password will not grant access to the computer.

180 citations


Journal ArticleDOI
TL;DR: A technique to allow long password-phrases that makes an exhaustive search impracticable is presented, and a solution to eavesdropping problems using public-key cryptography is proposed.
Abstract: Due to the increasing value of information being stored in computers, it is important that unforgeable user authentication policies are implemented. Existing password authentication schemes, threats and counter-measures are described. A solution to eavesdropping problems using public-key cryptography is proposed. A technique to allow long password-phrases that makes an exhaustive search impracticable is presented.

11 citations