Password typo correction using discrete logarithms

NK Blanchard - IC-CSCE 2019-8th International Conference on …, 2019 - hal.science
As passwords remain the main online authentication method, focus has shifted from naive
entropy to how usability improvements can increase security. Chatterjee et al. recently …

Making more extensive and efficient typo-tolerant password checkers

E Blanchard - 2020 IEEE 44th Annual Computers, Software …, 2020 - ieeexplore.ieee.org
As passwords remain the main online authentication method, focus has shifted from naive
entropy to how usability improvements can increase security. Chatterjee et al. recently …

[PDF][PDF] Secure and Efficient Password Typo Tolerance

NK Blanchard - ACM Conference, 2019 - koliaza.com
Despite recent advances in biometric authentication [39] and account linking [4], passwords
are still the main method of authentication used online and will probably remain so in the …

The typtop system: Personalized typo-tolerant password checking

R Chatterjee, J Woodage, Y Pnueli… - Proceedings of the …, 2017 - dl.acm.org
Password checking systems traditionally allow login only if the correct password is
submitted. Recent work on typo-tolerant password checking suggests that usability can be …

pASSWORD tYPOS and how to correct them securely

R Chatterjee, A Athayle, D Akhawe… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We provide the first treatment of typo-tolerant password authentication for arbitrary user-
selected passwords. Such a system, rather than simply rejecting a login attempt with an …

Client-side hashing for efficient typo-tolerant password checkers

E Blanchard - International Journal of Systems and Software …, 2022 - igi-global.com
Credential leaks still happen with regular frequency, and show evidence that, despite
decades of warnings, password hashing is still not correctly implemented in practice. The …

[PDF][PDF] Tipsy: How to Correct Password Typos Safely

P Partarrieu, Z Geradts - 2021 - rp.os3.nl
We implement and test a simple typo tolerant password authentication scheme as well as its
personalised counterpart. Our experiments measure the security loss and give examples of …

Vaultime: Regaining user control for password managers through auto-correction

L Guan, S Farhang, Y Pu, P Guo, J Grossklags… - Security and Privacy in …, 2018 - Springer
Users are often educated to follow different forms of advice from security experts. For
example, using a password manager is considered an effective way to maintain a unique …

Towards formal verification of password generation algorithms used in password managers

M Grilo, JF Ferreira, JB Almeida - arXiv preprint arXiv:2106.03626, 2021 - arxiv.org
Password managers are important tools that enable us to use stronger passwords, freeing
us from the cognitive burden of remembering them. Despite this, there are still many users …

tPAKE: typo-tolerant password-authenticated key exchange

T Pongmorrakot, R Chatterjee - … 2020, Kolkata, India, December 17–21 …, 2020 - Springer
Password-authenticated key exchange (PAKE) enables a user to authenticate to a server by
proving the knowledge of the password without actually revealing their password to the …