[ Pobierz całość w formacie PDF ]
.ps.NOTE: As you go along, you will see manyof these files have a *.ps extension.This signifies a PostScript file.PostScript is a language and method of preparing documents.It was createdby Adobe, the makers of Acrobat and Photoshop.To read a PostScript file, you need a viewer.One very good one is Ghostscript, whichis shareware and can be found at http://www.cs.wisc.edu/~ghost/.Another good package (and a little more lightweight) is a utility called Rops.Rops is available for Windows and is located here:http://www5.zdnet.com/ (the ZDNetsoftware library)http://oak.oakland.edu (the Oaksoftware repository)Other papers of importance include the following:"Observing Reusable Password Choices"Purdue Technical Report CSD-TR 92-049Eugene H.SpaffordDepartment of Computer Sciences, Purdue UniversityDate: July 3, 1992Search String: Observe.ps"Password Security: A Case History"Robert Morris and Ken ThompsonBell LaboratoriesDate: UnknownSearch String: pwstudy.ps"Opus: Preventing Weak Password Choices"Purdue Technical Report CSD-TR 92-028Eugene H.SpaffordDepartment of Computer Sciences, Purdue UniversityDate: June 1991Search String: opus.PS.gz"Federal Information Processing Standards Publication 181"Announcing the Standard for Automated Password GeneratorDate: October 5, 1993URL: http://www.alw.nih.gov/Security/FIRST/papers/password/fips181.txt"Augmented Encrypted Key Exchange: A Password-Based Protocol Secure AgainstDictionary Attacks and Password File Compromise"Steven M.Bellovin and Michael MerritAT&T Bell LaboratoriesDate: UnknownSearch String: aeke.ps"A High-Speed Software Implementation of DES"David C.FeldmeierComputer Communication Research GroupBellcoreDate: June 1989Search String: des.ps"Using Content Addressable Search Engines to Encrypt and Break DES"Peter C.WaynerComputer Science DepartmentCornell UniversityDate: UnknownSearch String: desbreak.ps"Encrypted Key Exchange: Password-Based Protocols Secure Against DictionaryAttacks"Steven M.Bellovin and Michael MerritAT&T Bell LaboratoriesDate: UnknownSearch String: neke.ps"Computer Break-ins: A Case Study"Leendert Van DoornVrije Universiteit, The NetherlandsDate: Thursday, January 21, 1993Search String: holland_case.ps"Security Breaches: Five Recent Incidents at Columbia University"Fuat Baran, HowardKaye, and Margarita SuarezCenter for Computing ActivitiesColombia UniversityDate: June 27, 1990Search String: columbia_incidents.psOther Sources and DocumentsFollowing is a list of other resources.Some are not available on the Internet.However, there are articles that can be obtained through various online services(perhaps Uncover) or at your local library through interlibrary loan or through microfiche.You may have to search more aggressively for some of these, perhaps using the Libraryof Congress (locis.loc.gov) or perhaps an even more effective tool, likeWorldCat (www.oclc.org)."Undetectable Online Password Guessing Attacks"Yun Ding and Patrick Horster,OSR, 29(4), pp.77-86Date: October 1995"Optimal Authentication Protocols Resistant to Password Guessing Attacks"Li GongStanford Research InstituteComputer Science LaboratoryMen Park, CADate: UnknownSearch String: optimal-pass.dvi or optimal-pass.ps"A Password Authentication Scheme Based on Discrete Logarithms"Tzong Chen Wu and Chin Chen ChangInternational Journal of Computational Mathematics; Vol.41, Number 1-2, pp.31-371991"Differential Cryptanalysis of DES-like Cryptosystems"Eli Biham and Adi ShamirJournal of Cryptology, 4(1), pp.3-721990"A Proposed Mode for Triple-DES Encryption"Don Coppersmith, Don B.Johnson, and Stephen M.MatyasIBM Journal of Research and Development, 40(2), pp.253-262March 1996"An Experiment on DES Statistical Cryptanalysis"Serve VaudenayConference on Computer and Communications Security, pp
[ Pobierz całość w formacie PDF ]