『沒有一種密碼是100%安全的,然而有一種新的方法能使被偷的密碼失效!
新的方法能使被偷的密碼失效
May 19, 2011 | From US News & World Report
No password is 100% secure. There are always ways and means for those with malicious intent to hack, crack or socially engineer access to a password. Indeed, there are more and more websites and databases compromised on a seemingly daily basis. A new approach to verifying passwords that also takes into account the speed with which a user types in their login and the gaps between characters would render a stolen password useless.
Writing in the International Journal of Internet Technology and Secured Transactions computer scientists from Beirut explain the shortcomings of previous attempts at key-pattern analysis. KPA is an attempt to scrutinize the speed with which a user taps the keys as well as measuring the gaps between keystrokes, the beat of their typing. KPA has also been tested with modified keyboards that measure the force with which keys are pressed. The result can be a biometric profile of the way an individual user types in their password. If the biometric does not match the user then the password fails even if it is "correct".
Ravel Jabbour, Wes Masri and Ali El-Hajj of the American University of Beirut, in Lebanon, point out how inconvenient a modified keyboard would be to an organization or individual. They explain how previous attempts at KPA fail if the pressing of two keys overlaps. Early efforts also focus on "inter" timing, the time lag between pressing one key and the next, which is not adequate to ensure a password is usable only by the legitimate user. The team instead has incorporated "intra" timing that measures how long each key remains depressed, which they say gives them the beat of the typing and is a much more robust parameter.
The program gathers information about how the user is typing in their password by recording the electronic signals from a standard keyboard as keys are pressed and released. The program then compares the pattern of the password typed with a prestored pattern recorded when the account is initially setup. A user would be expected to repeatedly type their password at the login registration stage to record a reproducible typing pattern. The validation algorithm then looks at the various parameters, intra and inter timing the relationships between two keys (digraph), three keys (trigraph) and up to the number of keys that are the password length.
Obviously, a longer password will provide a more complicated profile of the person's typing and so reduce the risk of the typing of anyone else typing the password with the same timing pattern as the legitimate user. There is a trade-off, of course, too long a password and even a legitimate user is unlikely to reproduced their typing pattern accurately every time they enter the password. Password distribution can also be accommodated for by creating KPA groups for the same password for those users eager to share their passwords with friends and colleagues without impinging on the security of the system, the team says. (492 words)
特別聲明:①凡本網(wǎng)注明稿件來源為"原創(chuàng)"的,轉(zhuǎn)載必須注明"稿件來源:育路網(wǎng)",違者將依法追究責任;
②部分稿件來源于網(wǎng)絡,如有侵權(quán),請聯(lián)系我們溝通解決。
25人覺得有用
24
2011.10
『雖然谷歌互聯(lián)網(wǎng)電視目前仍不被消費者和生產(chǎn)商們認可,但還需幾年來判定這一產(chǎn)品是成功還是失敗,目前......
24
2011.10
『網(wǎng)站估價遠遠高于其實際價值的跡象表明互聯(lián)網(wǎng)泡沫在20世紀90年代出現(xiàn)后,又卷土重來了!弧 he n......
24
2011.10
『他人身體上的痛苦會觸發(fā)我們痛苦的感受,然而,看到他人處于某一尷尬情景,也會使我們產(chǎn)生類似的感受......
24
2011.10
2012年的中醫(yī)綜合考試大綱出來已久,通過參看其內(nèi)容結(jié)構(gòu)以及試卷題型結(jié)構(gòu)可以看出,今年的考試大綱......
24
2011.10
試卷分布 本試卷滿分300分,考試時間180分鐘,總題量180道小題,分ABX三種題型。在試卷內(nèi)容結(jié)構(gòu)......
24
2011.10
『在過去,美國的互聯(lián)網(wǎng)用戶僅需繳納一定的費用就可在網(wǎng)上自由下載各類資源。而如今,這種自由卻受到了......