Skip to main content

Hyppocrates A New Proactive Password Checker

  • Conference paper
  • First Online:
Book cover Information Security (ISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2200))

Included in the following conference series:

  • 533 Accesses

Abstract

In this paper we propose a new proactive password checker, a program which prevents the choice of easy-to-guess passwords. The checker uses a decision tree which has been set up applying the Minimum Description LengthPrinciple and a Pessimistic Pruning Technique to refine its predictive power. Experimental results show a substantial improvement in performances of this checker with respect to previous proposals. Moreover, the system is user-friendly and can be adapted to a per-site policy by the system administrator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Anderson. Computer Security Threat Monitoring and Surveillance. Fort Washington, PA: James P. Anderson Co. April 1980.

    Google Scholar 

  2. F. Bergadano, B. Crispo and G. Ruffo. High Dictionary Compression for Proactive Password Checking. ACM Transactions on Information and System Security. Vol. 1, No. 1, November 1998, Pages 3–25.

    Article  Google Scholar 

  3. M. Bishop. Anatomy of a Proactive Password Checker. Proceedings of the Third UNIX Security Symposium, pp. 130–139, September 1992.

    Google Scholar 

  4. M. Bishop. Proactive Password Checking. Proceedings of the Fourth Workshop on Computer Security Incident Handling, pp. W11: 1–9 (Aug. 1992).

    Google Scholar 

  5. M. Bishop. Improving System Security via Proactive Password Checking. Computers and Security, 14(3) pp. 233–249 (1995)

    Article  Google Scholar 

  6. M. Bishop. Password Management. Proceedings of COMPCON 1991, pp. 167–169 (Feb. 1991).

    Google Scholar 

  7. B. Bloom, Space/Time Trade-offs in Hash Coding with Allowable Errors. Communications of ACM, July 1970.

    Google Scholar 

  8. V. Boyko, P. MacKenzie, S. Patel. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Proceedings of Eurocrypt 2000, LNCS vol. 1807, pp. 156–171.

    Google Scholar 

  9. Breiman, L., J. H. Friedman, R. A. Olshen, and C. J. Stone. Classification and Regression Trees. Wadsworth & Brooks/Cole, 1984 Advanced Books & Software. Pacific Grove, CA.

    MATH  Google Scholar 

  10. C. Davies and R. Ganesan. Bapasswd: A new proactive password checker. Proceedings of the 16th National Conference on Computer Security. Baltimore, MD, Sept. 20–23.

    Google Scholar 

  11. J. Katz, R. Ostrovsky, M. Yung, Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Proceedings of Eurocrypt 2001 LNCS vol. 2045, pp. 475–495.

    Google Scholar 

  12. D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proceedings of the Fifth Data Communications Symposium. September 1977.

    Google Scholar 

  13. A. Muffett. Crack 5.0. USENET News.

    Google Scholar 

  14. J. B. Nagle. An Obvious Password Detector. USENET News 16, 60.

    Google Scholar 

  15. B. C. Neuman and T. Tso. Kerberos: an authentication service for computer networks. IEEE Trans. Commun., 32. 33–38, 1994.

    Google Scholar 

  16. J. R. Quinlan. Simplifying decision Trees, Int. J. of Man Machine Studies, 27 Academic Press Limited, London, 1987

    Google Scholar 

  17. J. R. Quinlan. C4.5: Program for Machine Learning, Morgan Kaufmann Publishers Inc., San Francisco, CA

    Google Scholar 

  18. J. Rissanen, Stochastic complexity and modeling, Ann. Stat. 14.3, 1080–1100.

    Google Scholar 

  19. E. Spafford. OPUS: Preventing Weak Password Choices. Computers and Security, No. 3, 1992

    Google Scholar 

  20. R. Stalling. Network and Internetwork Security. Prentice Hall, Englewood Cliffs, New Jersey

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blundo, C., D’Arco, P., De Santis, A., Galdi, C. (2001). Hyppocrates A New Proactive Password Checker. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-45439-X_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42662-2

  • Online ISBN: 978-3-540-45439-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics