tuwort spezial #8: Das Passwort

Spezialausgabe Tuwort-Podcast

Intro: Audioclip aus dem Film „WarGames“ (1983)

Tobias Dussa

Geschichte des Passworts und grundlegende Funktionen

  • Lennon, Brian. Passwords: Philology, Security, Authentication. Cambridge, Massachusetts ; London, England: The Belknap Press of Harvard University Press, 2018.
  • Buch der Richter, Kapitel 12

Arten von Passwörtern, Komplexitätsregeln, randomisierte vs. nicht-randomisierte Passwörter

  • Burnett, M., & Kleiman, D. (2006). Perfect passwords: Selection, protection, authentication. Syngress Publ.

Passwort Hashing und Cracking

  • Netmux (Ed.). (2017). Hash crack: Password cracking manual (V2.0). Netmux.

Passwort vs. Passphrase

  • Bonneau, J., & Shutova, E. (2012). Linguistic Properties of Multi-word Passphrases. In J. Blyth, S. Dietrich, & L. J. Camp (Eds.), Financial Cryptography and Data Security (Vol. 7398, pp. 1–12). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-34638-5_1
  • XKCD – CorrectHorseBatteryStaple: https://m.xkcd.com/936/

Kulturalität von Passwörtern

  • AlSabah, M., Oligeri, G., & Riley, R. (2018). Your culture is in your password: An analysis of a demographically-diverse password dataset. Computers & Security, 77, 427–441. https://doi.org/10.1016/j.cose.2018.03.014
  • Yang, Cheng, Jui‐long Hung, and Zhangxi Lin. “An Analysis View on Password Patterns of Chinese Internet Users.” Nankai Business Review International 4, no. 1 (March 1, 2013): 66–77. https://doi.org/10.1108/20408741311303887
  • Maoneke, P. B., Flowerday, S., & Isabirye, N. (2018). The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View. In L. J. Janczewski & M. Kutyłowski (Eds.), ICT Systems Security and Privacy Protection (Vol. 529, pp. 33–46). Springer International Publishing. https://doi.org/10.1007/978-3-319-99828-2_3
  • Veras, R., Collins, C., & Thorpe, J. (2021). A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords. ACM Transactions on Privacy and Security, 24(3), 1–21. https://doi.org/10.1145/3448608

Good Practice: Generieren, memorieren und aufbewahren von Passwörtern

Alternative Authentifizierungsmethoden

Spaß mit Passwörtern

Musik