This is a whitepaper that discusses using Compute Unified Device Architecture (CUDA) GPU cracking to crack passwords.
73c83fc3029646d3e3bb2f6758ef93e292ef63789d5c4c52472d85962bf1620e
Whitepaper discussing information leakage and password extraction from a BIOS.
11c0d68db3008a8f6d96bdaa51cd4f9d4990d59b038ddbb12e9e044505537b96
Password article that discusses common attacks and possible solutions.
3538e96f4db235417b69d3fe2694ab99b4e8ae7672633c45c99c2eb10fb74699
Paper written about the art of brute force cracking that comes with example code.
45d8ad1042d40237b9961db4391407e13922af227ab3c00955c625e2a4c5e4fe
Department of Defense Password Management Guideline: Enumerates a number of good password management practices
6466f6042fc756932b8a33a461f5623b5255682b0d152c13602b9f9d31f6dabf
Standard for Automated Password Generator: Federal Information Processing Standard No 181
02952ef5f8c13c50eb6ce030fb7c7f1c01dd13574d86e18a35ba67c6136f1652
Foiling the Cracker: A Survey of, and Improvements to, Password Security: Demonstrates the ease with which most passwords can be guessed by a motivated attacker
0a147e4aaa5a55b5df22688b5b2910670bc78fe97752153c82e53ff6193a664a
Observing Reusable Password Choices: A method for observing password choices made by users, and how to protect it from being compromised
c6f1afcd834b4c7d297d03eaa61d696bc81d6a11c24f131ec1bf3cda70d79cbe
OPUS: Preventing Weak Password Choices. A system that uses Bloom filters to implement a constant-time dictionary lookup, regardless of dictionary size, to check a user's password choice for " goodness"
6b57074b96c811eaf86668faadb884f7bd2f8f172c78c23487e7c896d94214f0
User Authentication and Related Topics: An Annotated Bibliography
08245ddd0136802271b1e792765b6280b2980b7cae625f9140b0d398766bc550
Password Security: A Case History: A description of the original UNIX password algorithm, and the reasons for replacing it with the current one
ca6cfc5f377dcf373bb18130b53ef90f3f7c98de4ae14a86a88535f94b44da03
UNIX Password Security - Ten Years Later: A reexamination of the UNIX password algorithm after ten years of advances in software and hardware
93aafb58b4907d97438db4c8dfea03f1de784857ae6b9580f04bf9c47c4c552f
The S/Key One-Time Password System: A freely available implementation of one-time passwords
e879730b059990d4238d75856c18b483acdcffeca91ba722865da85a07e9b3ec