This report considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both in storage and transmission, is dealt with in the next section, followed by brief sections on current implementations and cost considerations. A glossary and an annotated bibliography of all referenced material are included.
This report considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics,...
See full abstract
This report considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both in storage and transmission, is dealt with in the next section, followed by brief sections on current implementations and cost considerations. A glossary and an annotated bibliography of all referenced material are included.
Hide full abstract
Keywords
computer networking; computer security; controlled access; identification; passwords; personal authentication