Technology Corner: Brute Force Password Generation -- Basic Iterative and Recursive Algorithms
Author(s) -
Nick V. Flor,
Haile Shan
Publication year - 2011
Publication title -
the journal of digital forensics, security and law
Language(s) - English
Resource type - Journals
eISSN - 1558-7223
pISSN - 1558-7215
DOI - 10.15394/jdfsl.2011.1102
Subject(s) - password , password strength , computer science , brute force attack , password cracking , computer security , s/key , password policy , one time password , cognitive password , algorithm , brute force , cryptography
Most information systems are secured at minimum by some form of password protection. For various reasons a password may be unavailable, requiring some form of password recovery procedure. One such procedure is software-based automated password recovery, where a program attempts to log into a system by repeatedly trying different password combinations. At the core of such software is a password generator. This article describes the basic iterative and recursive algorithms for generating all possible passwords of a given length, which is commonly referred to as brute-force password generation. The paper ends with a discussion of alternative password recovery procedures one should attempt before brute-force password recovery.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom