About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings

Research Article

Exploring the Network of Real-World Passwords: Visualization and Estimation

Download(Requires a free EAI acccount)
339 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-78813-5_8,
        author={Xiujia Guo and Zhao Wang and Zhong Chen},
        title={Exploring the Network of Real-World Passwords: Visualization and Estimation},
        proceedings={Security and Privacy in Communication Networks. 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22--25, 2017, Proceedings},
        proceedings_a={SECURECOMM},
        year={2018},
        month={4},
        keywords={Computer security Visualization Password sets Power-law distribution Scale-free network NP-complete},
        doi={10.1007/978-3-319-78813-5_8}
    }
    
  • Xiujia Guo
    Zhao Wang
    Zhong Chen
    Year: 2018
    Exploring the Network of Real-World Passwords: Visualization and Estimation
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-78813-5_8
Xiujia Guo1,*, Zhao Wang,*, Zhong Chen,*
  • 1: Peking University
*Contact email: guoxj@pku.edu.cn, wangzhao@pku.edu.cn, zhongchen@pku.edu.cn

Abstract

The distribution of passwords has been the focus of many researchers when we come to security and privacy issues. In this paper, the spatial structure of empirical password sets is revealed through the visualization of disclosed password sets from the website of hotmail, 12306, phpbb and yahoo. Even though the choices of passwords, in most of the cases, are made independently and privately, on closer scrutiny, we surprisingly found that the networks of passwords sets of large scale individuals have similar topological structure and identical properties, regardless of demographic factors and site usage characteristics. The visualized graph of passwords is considered to be a scale-free network for whose degree distribution the power law is a good candidate fit. Furthermore, on the basis of the network graph of the password set we proposed, the optimal dictionary problem in dictionary-based password cracking is demonstrated to be equivalent in computing complexity to the dominating set problem, which is one of the well-known NP-complete problems in graph theory. Hence the optimal dictionary problem is also NP-complete.

Keywords
Computer security Visualization Password sets Power-law distribution Scale-free network NP-complete
Published
2018-04-26
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-78813-5_8
Copyright © 2017–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL