z-logo
open-access-imgOpen Access
Technology Corner: Brute Force Password Generation -- Basic Iterative and Recursive Algorithms
Author(s) -
Nick V. Flor,
Haile Shan
Publication year - 2011
Publication title -
˜the œjournal of digital forensics, security and law
Language(s) - English
Resource type - Journals
eISSN - 1558-7223
pISSN - 1558-7215
DOI - 10.15394/jdfsl.2011.1102
Subject(s) - password , password strength , computer science , brute force attack , password cracking , computer security , s/key , password policy , one time password , cognitive password , algorithm , brute force , cryptography
Most information systems are secured at minimum by some form of password protection. For various reasons a password may be unavailable, requiring some form of password recovery procedure. One such procedure is software-based automated password recovery, where a program attempts to log into a system by repeatedly trying different password combinations. At the core of such software is a password generator. This article describes the basic iterative and recursive algorithms for generating all possible passwords of a given length, which is commonly referred to as brute-force password generation. The paper ends with a discussion of alternative password recovery procedures one should attempt before brute-force password recovery.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom