000 01905nam  2200277za 4500
0019.807269
003CaOODSP
00520240219183352
007cr |||||||||||
008150723s2014    onc     ob   f000 0 eng d
040 |aCaOODSP|beng
041 |aeng|bfre
043 |an-cn---
0861 |aD68-2/27-2014E-PDF
1001 |aSalois, Martin.
24510|aPassword complexity recommendations |h[electronic resource] : |b“xez&pAxat8Um” or “P4$$w0rd!!!!”? / |cMartin Salois.
260 |a[Ottawa] : |bDefence Research and Development Canada, |c2014.
300 |avii, 18, [2] p. : |bfig., tables.
4901 |aScientific report ; |v2014-R27
500 |aOctober 2014.
504 |aIncludes bibliographical references.
520 |aThe password-cracking world is in turmoil. Many new technologies, such as graphic cards (e.g., NVidia CUDA or ATI/AMD GPUs), make easily available computing power that was previously reserved to very rich organizations. Many efficient tools followed using these technologies, for better or for worse. This report illustrates the type of performance one can obtain from a generic $2,000 computer and the lessons to learn on password length for different web sites and software programs. The larger conclusion is that an 11-character password, containing uppercase-lowercase-digits-symbols, is the ideal length for the foreseeable future when no other information is available. More characters are always better; less can be dangerous in the current state of the technology. The use of a password manager, a program that generates and manages strong, complex passwords, is strongly recommended.
69207|2gccst|aComputer security
7102 |aDefence R&D Canada.
830#0|aScientific report (Defence R&D Canada)|v2014-R27|w(CaOODSP)9.802305
85640|qPDF|s335 KB|uhttps://publications.gc.ca/collections/collection_2015/rddc-drdc/D68-2-27-2014-eng.pdf