Have a personal or library account? Click to login
Passcrack: cracking, hashing, and strength testing for a secure digital future Cover

Passcrack: cracking, hashing, and strength testing for a secure digital future

Open Access
|Jun 2025

References

  1. C. Florencio and C. Herley, “A large-scale study of web password habits,” in Proc. ACM SIGCHI Conf. Human Factors Comput. Syst., Seoul, South Korea, 2015, pp. 1–10.
  2. X. Liu, Y. Wang, and J. Zhang, “Improving password security through machine learning-based strength estimation,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 4, pp. 865–879, Apr. 2018.
  3. S. Kwon, J. Kim, and H. Lee, “Analyzing password vulnerabilities: Cracking methods and defenses,” J. Cyber Security, vol. 15, no. 3, pp. 45–58, 2020.
  4. B. Miller, R. Johnson, and A. Davis, “Comparative study of password cracking tools: Efficiency and security implications,” IEEE Trans. Cyber Security, vol. 9, no. 2, pp. 345–360, 2022.
  5. M. Wu, T. S. Smith, and L. Chen, “Educational impact of password security awareness programs,” in Proc. IEEE Int. Conf. Cyber Security, New York, NY, USA, 2021, pp. 89–94.
  6. J. Wang and X. Zhang, “Entropy-based password strength measurement: A new approach,” in Proc. Int. Conf. Adv. Comput. Security, San Francisco, CA, USA, 2020, pp. 120–126.
  7. S. Das, K. Patel, and P. Reddy, “Effectiveness of rainbow table attacks against various hashing algorithms,” IEEE Access, vol. 8, pp. 234–245, 2020.
  8. R. D. Smith and J. Chen, “Comparative study of password hashing algorithms: bcrypt, PBKDF2, and Argon2,” IEEE Trans. Inf. Syst. Security, vol. 19, no. 4, pp. 340–355, 2021.
  9. Y. Ruoti and A. Muir, “Security risks of password reuse: A large-scale empirical study,” IEEE Trans. Depend. Secure Comput., vol. 18, no. 1, pp. 10–22, 2021.
  10. L. Toubiana, F. Miller, and K. Singh, “Human factors in password security: Behavioral influences,” in Proc. Int. Conf. Cyber Behav. Secur., London, U.K., 2017, pp. 140–152.
  11. R. Bonneau, C. Herley, and P. van Oorschot, “Password security: Alternative authentication mechanisms,” in Proc. IEEE Symp. Security Privacy, Washington, DC, USA, 2015, pp. 50–64.
  12. M. Wang and Y. Zhang, “Phishing attacks and password compromises: A security analysis,” J. Inf. Security Res., vol. 22, no. 5, pp. 30–42, 2019.
  13. H. Hadnagy, Social Engineering: The Science of Human Hacking, 2nd ed. Hoboken, NJ, USA: Wiley, 2018.
  14. A. Pashalidis and S. Furnell, “User compliance with password security policies,” Comput. Secur., vol. 65, pp. 120–134, 2016.
  15. M. H. Zetter, P. J. O'Neill, and R. D. Vance, “User psychology in password creation: Security vs. memorability,” Comput. Human Behav., vol. 110, pp. 345–362, 2019.
  16. C. McCarty and K. Leach, “Multi-factor authentication adoption and usability challenges,” Comput. Secur., vol. 85, pp. 100–112, 2017.
  17. S. P. Xu and L. Chen, “Passwordless authentication: A security perspective,” in Proc. IEEE Int. Conf. Cybersecurity Technol., 2021, pp. 250–260.
  18. X. Zhang, T. Lin, and P. Wei, “Deep learning-based password cracking: Effectiveness and countermeasures,” IEEE Trans. Neural Netw. Learn. Syst., vol. 34, no. 3, pp. 567–579, Mar. 2023.
  19. R. S. Mahmood and H. Ali, “Integrating password policies with user compliance strategies,” IEEE Trans. Inf. Syst. Security, vol. 17, no. 6, pp. 210–224, 2019.
  20. D. Alshaikh and M. Casey, “Evaluating password strength metrics: A security analysis,” in Proc. IEEE Int. Conf. Cyber Security Appl., Tokyo, Japan, 2020, pp. 98–112.
  21. S. Jain and R. Gupta, “Deep learning-based password security enhancements,” in Proc. IEEE Int. Conf. Artificial Intelligence Security, Berlin, Germany, 2018, pp. 215–224.
  22. R. Shapiro and S. Levit, “Mobile application security and password management,” IEEE Trans. Mobile Comput., vol. 15, no. 5, pp. 780–795, 2020.
  23. P. J. O'Neill and M. Casey, “Password entropy and its implications for security policies,” in Proc. IEEE Symp. Information Theory Security, Paris, France, 2020, pp. 88–102.
Language: English
Submitted on: Jan 9, 2025
Published on: Jun 10, 2025
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2025 Pooja Bagane, Mokshada Sable, Aarohi Panicker, Anujesh Ansh, Obsa Amenu Jebessa, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.