Skip to main content

Computational Security and the Economics of Password Hacking

  • Conference paper
  • First Online:
Future Network Systems and Security (FNSS 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 759))

Included in the following conference series:

Abstract

Internet Security is a growing issue within the modern world. One of the weakest links in computer security is the use and misuse of passwords. As knowledge and technology becomes more widely spread, the methods of hacking passwords become increasingly easier and more accessible. With so much data being protected by passwords, it is important that these passwords are properly protected and secure. In this paper we present numerous methods of hacking passwords, as well as preventative measures that you can take to prevent your passwords from being stolen or misused. Two new algorithms are presented under the category of brute force and dictionary attack and compared with John the Ripper, Cain & Abel, and HashCat algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beaver, K.: Hacking for Dummies. Wiley, Somerset (2012). ProQuest elibrary. Accessed 6 Mar 2016

    Google Scholar 

  2. Gagneja, K.K.: Secure Communication Scheme for Wireless Sensor Networks to maintain Anonymity. IEEE ICNC, Anaheim (2015)

    Google Scholar 

  3. Gagneja, K.K., Nygard, K.: Energy efficient approach with integrated key management scheme for wireless sensor networks. In: ACM MOBIHOC, Bangalore, India, pp. 13–18, 29 July 2013

    Google Scholar 

  4. Gagneja, K.K., Nygard, K.: Heuristic clustering with secured routing in heterogeneous sensor networks. In: IEEE SECON, New Orleans, USA, pp. 9–16, 24–26 June 2013

    Google Scholar 

  5. Gagneja, K.K., Nygard, K.: Pairwise post deployment key management scheme for heterogeneous sensor networks. In: 13th IEEE WoWMoM 2012, San Francisco, California, USA, pp. 1–2, 25–28 June 2012

    Google Scholar 

  6. Gagneja, K.K., Nygard, K.: Key management scheme for routing in clustered heterogeneous sensor networks. In: IEEE NTMS 2012, Security Track, Istanbul, Turkey, pp. 1–5, 7–10 May 2012

    Google Scholar 

  7. Gagneja, K.K.: Knowing the ransomware and building defense against it - specific to health care institutes. In: IEEE MobiSecServ, Miami, USA, February 2017

    Google Scholar 

  8. Jewell, M.T.J.: Maxx Theft Believed Largest Hack Ever, March 2007 www.nbcnews.com. Accessed 07 March 2016

  9. Gagneja, K.K.: Global perspective of security breaches in facebook. In: FECS, Las Vegas, USA, 21–24 July 2014

    Google Scholar 

  10. Evanoff, L., Hatch, N., Gagneja, K.K.: Home network security: beginner vs advanced. In: ICWN, Las Vegas, USA, 27–30 July 2015

    Google Scholar 

  11. Gagneja, K.K., Nygard, K.: A QoS based heuristics for clustering in two-tier sensor networks. In: IEEE FedCSIS, Wroclaw, Poland, pp. 779–784, 9–12 September 2012

    Google Scholar 

  12. McCandless, D.: Ideas, issues, knowledge, data - visualized! (2016). http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/. Accessed 07 Mar 2016

  13. Pepitone, J.: Massive’ credit card data breach involves all major brand, April 2012. http://money.cnn.com/2012/03/30/technology/credit-card-data-breach/index.htm. Accessed 07 Mar 2016

  14. Gagneja, K.K.: Pairwise key distribution scheme for two-tier sensor networks. In: IEEE ICNC, Honolulu, Hawaii, USA, pp. 1081–1086, 3–6 February 2014

    Google Scholar 

  15. John, P.: How I’d Hack Your Weak Passwords, December 2010. lifehacker.com. Accessed 6 Mar 2016

  16. Arvinderpal, S., Gagneja, K.K.: Incident response through behavioral science: an industrial approach. In: IEEE CSCI, LasVegas, USA, 7–9 December 2015

    Google Scholar 

  17. University Alliance. Experts’ View of the Future of Passwords. Villanova University (2016). https://www.villanovau.com/resources/iss/experts-view-password-security-future/#.WXAQOoTyvIU. Accessed 6 Mar 2016

  18. Davey, W.: Top Ten Password Cracking Techniques, 2 December 2011. http://www.alphr.com/features/371158/top-ten-password-cracking-techniques. Accessed 6 Mar 2016

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kanwalinderjit Gagneja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Gagneja, K., Jaimes, L.G. (2017). Computational Security and the Economics of Password Hacking. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2017. Communications in Computer and Information Science, vol 759. Springer, Cham. https://doi.org/10.1007/978-3-319-65548-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65548-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65547-5

  • Online ISBN: 978-3-319-65548-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics