Next: About this document ...
 Up: A Future-Adaptable Password Scheme
 Previous: Acknowledgments
- 1
 - 
Martín Abadi, T. Mark A. Lomas, and Roger Needham.
Strengthening passwords.
Technical note 1997-033, DEC Systems Research Center, September 1997.
 - 2
 - 
Steven M. Bellovin and Michael Merritt.
Encrypted key exchange: Password-based protocols secure against
  dictionary attacks.
In Proceedings of the 1992 IEEE Symposium on Security and
  Privacy, Oakland, CA, May 1992.
 - 3
 - 
Steven M. Bellovin and Michael Merritt.
Augmented encrypted key exchange.
In Proceedings of the First ACM Conference on Computer and
  Communications Security, pages 224-250, Oakland, CA, November 1993.
 - 4
 - 
Eli Biham.
A Fast New DES Implementation in Software.
In Fast Software Encryption, 4th International Workshop
  Proceedings, pages 260-271. Springer-Verlag, 1997.
 - 5
 - 
Solar Designer.
John the Ripper.
: !:}https://www.false.com/security/john.
 - 6
 - 
Electronic Frontier Foundation.
Cracking DES.
O'Reilly and Associates, 1998.
 - 7
 - 
Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer.
Protecting poorly chosen secrets from guessing attacks.
IEEE Journal on Selected Areas in Communications,
  11(5):648-656, June 1993.
 - 8
 - 
Shai Halevi and Hugo Krawczyk.
Public-key cryptography and password protocols.
In Proceedings of the 5th ACM Conference on Computer and
  Communications Security, 1998.
 - 9
 - 
Robert Morris and Ken Thompson.
Password Security: A Case History.
Communications of the ACM, 22(11):594-597, November 1979.
 - 10
 - 
National Bureau of Standards.
Data Encryption Standard, January 1977.
FIPS Publication 46.
 - 11
 - 
Sarvar Patel.
Number theoretic attacks on secure password schemes.
In Proceedings of the 1997 IEEE Symposium on Security and
  Privacy, pages 236-247, Oakland, CA, May 1997.
 - 12
 - 
QCrack.
: !:}ftp://chaos.infospace.com/pub/qcrack/qcrack-1.02.tar.gz.
 - 13
 - 
R. L. Rivest.
The MD5 Message Digest Algorithm.
RFC 1321, Apr 1992.
 - 14
 - 
Michael Ruby.
Pseudorandomness and Cryptographic Applications.
Princeton Computer Science Notes, 1996.
 - 15
 - 
Bruce Schneier.
Description of a New Variable-Length Key, 64-Bit Block Cipher
  (Blowfish).
In Fast Software Encryption, Cambridge Security Workshop
  Proceedings, pages 191-204. Springer-Verlag, December 1993.
 - 16
 - 
Thomas Wu.
The secure remote password protocol.
In Proceedings of the 1998 Internet Society Network and
  Distributed System Security Symposium, pages 97-111, San Diego, CA, March
  1998.
 - 17
 - 
Tatu Ylönen.
SSH - secure login connections over the Internet.
In Proceedings of the 6th USENIX Security Symposium, pages
  37-42, July 1996.
 
Niels Provos and David Mazieres
4/28/1999