Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
  1. Home
  2. Journal of Cryptology
  3. Article
A study of password security
Download PDF
Download PDF
  • Published: October 1989

A study of password security

  • Michael Luby1 &
  • Charles Rackoff2 

Journal of Cryptology volume 1, pages 151–158 (1989)Cite this article

  • 353 Accesses

  • 16 Citations

  • Metrics details

Abstract

We prove relationships between the security of a function generator when used in an encryption scheme and the security of a function generator when used in a UNIX-like password scheme.

Download to read the full article text

Working on a manuscript?

Avoid the common mistakes

References

  1. Blum, M., and Micali, S., How to generate cryptographically strong sequences of pseudorandom bits,SIAM J. Comput. Vol. 13, 1984, pp. 850–864.

    Google Scholar 

  2. Denning, D.,Cryptography and Data Security, Addison-Wesley, Reading, MA, 1983.

    Google Scholar 

  3. Goldreich, O., Goldwasser, S., and Micali, S., How to construct random functions,J. Assoc. Comput. Mach., Vol. 33, No. 4, October 1986, pp. 792–807.

    Google Scholar 

  4. Luby, M., and Rackoff, C., Pseudo-random permutation generators and cryptographic composition,Proceedings of the 18th ACM Annual Symposium on Theory of Computing, May 28–30, 1986, pp. 356–363.

  5. Luby, M., and Rackoff, C., How to construct pseudo-random permutations from pseudorandom functions,SIAM J. Comput., Vol. 17, 1988, pp. 373–386.

    Google Scholar 

  6. Luby, M., and Rackoff, C., A study of password security,Proceedings of Crypto '87, Lecture Notes in Computer Science, Vol. 293, Springer-Verlag, Berlin 1988, pp. 392–397.

    Google Scholar 

  7. Yao, A. C., Theory and applications of trapdoor functions,Proceedings of the 23rd Symposium on the Foundations of Computer Science, 1982, pp. 80–91.

Download references

Author information

Authors and Affiliations

  1. International Computer Science Institute, 94704, Berkeley, CA, U.S.A.

    Michael Luby

  2. Computer Science Department, University of Toronto, M5S 1A4, Toronto, Ontario, Canada

    Charles Rackoff

Authors
  1. Michael Luby
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Charles Rackoff
    View author publications

    You can also search for this author in PubMed Google Scholar

Additional information

On leave of absence from the Computer Science Department, University of Toronto. Research partially supported by the Canadian Natural Sciences and Engineering Research Council Operating Grant A8092 and by a University of Toronto research grant.

Research partially supported by the Canadian Natural Sciences and Engineering Research Council Operating Grant A3611.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Luby, M., Rackoff, C. A study of password security. J. Cryptology 1, 151–158 (1989). https://doi.org/10.1007/BF02252873

Download citation

  • Received: 19 August 1988

  • Revised: 09 January 1989

  • Issue Date: October 1989

  • DOI: https://doi.org/10.1007/BF02252873

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Key words

  • Password security
  • UNIX
  • Pseudorandom function generator
Download PDF

Working on a manuscript?

Avoid the common mistakes

Advertisement

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature