A Comprehensive Evaluation on the Benefits of Context Based Password Cracking for Digital Forensics
Kanta, Aikaterini; Coisel, Iwen; Scanlon, Mark
Publication Date: June 2024
Publication Name: Journal of Information Security and Applications
Abstract: Password-based authentication systems have many weaknesses, yet they remain overwhelmingly used and their announced disappearance is still undated. The system admin overcomes the imperfection by skilfully enforcing a strong password policy and sane password management on the server side. But in the end, the user behind the password is still responsible for the password's strength. A poor choice can have dramatic consequences for the user or even for the service behind, especially considering critical infrastructure. On the other hand, law enforcement can benefit from a suspect's weak decisions to recover digital content stored in an encrypted format. Generic password cracking procedures can support law enforcement in this matter -- however, these approaches quickly demonstrate their limitations. This article proves that more targeted approaches can be used in combination with traditional strategies to increase the likelihood of success when contextual information is available and can be exploited.
Download Paper:
BibTeX Entry:
@article{kanta2024ContextBasedPasswordCracking,
author={Kanta, Aikaterini and Coisel, Iwen and Scanlon, Mark},
title="{A Comprehensive Evaluation on the Benefits of Context Based Password Cracking for Digital Forensics}",
journal="{Journal of Information Security and Applications}",
year=2024,
pages = {},
volume = {},
month=06,
issn = {2214-2126},
abstract={Password-based authentication systems have many weaknesses, yet they remain overwhelmingly used and their announced disappearance is still undated. The system admin overcomes the imperfection by skilfully enforcing a strong password policy and sane password management on the server side. But in the end, the user behind the password is still responsible for the password's strength. A poor choice can have dramatic consequences for the user or even for the service behind, especially considering critical infrastructure. On the other hand, law enforcement can benefit from a suspect's weak decisions to recover digital content stored in an encrypted format. Generic password cracking procedures can support law enforcement in this matter -- however, these approaches quickly demonstrate their limitations. This article proves that more targeted approaches can be used in combination with traditional strategies to increase the likelihood of success when contextual information is available and can be exploited.}
}