in the worst case. Currently, we are implementing a
prototype of our solution by relying on the Web Blue-
tooth API supported by Google Chrome.
REFERENCES
Andrews, R., Hahn, D. A., and Bardas, A. G. (2020). Mea-
suring the prevalence of the password authentication
vulnerability in ssh. In ICC 2020 - 2020 IEEE Inter-
national Conf. on Communications (ICC), pages 1–7.
Boehm, O., Caumanns, J., Franke, M., and Pfaff, O.
(2008). Federated authentication and authorization:
A case study. In 2008 12th International IEEE En-
terprise Distributed Object Computing Conference,
pages 356–362. IEEE.
Boneh, D. and Shoup, V. (2020). A graduate course in ap-
plied cryptography. Draft 0.5.
Bonneau, J., Herley, C., Oorschot, P. C. v., and Stajano, F.
(2012). The quest to replace passwords: A frame-
work for comparative evaluation of web authentica-
tion schemes. In 2012 IEEE Symposium on Security
and Privacy, pages 553–567.
Buccafurri, F., De Angelis, V., and Nardone, R. (2020). Se-
curing mqtt by blockchain-based otp authentication.
Sensors, 20(7):2002.
Chakraborty, D. and Bugiel, S. (2019). Simfido: Fido2
user authentication with simtpm. In Proceedings of
the 2019 ACM SIGSAC Conference on Computer and
Communications Security, pages 2569–2571.
Chiasson, S., Stobert, E., Forget, A., Biddle, R., and
Van Oorschot, P. C. (2011). Persuasive cued click-
points: Design, implementation, and evaluation of a
knowledge-based authentication mechanism. IEEE
Transactions on Dependable and Secure Computing,
9(2):222–235.
Das, A., Bonneau, J., Caesar, M., Borisov, N., and Wang, X.
(2014). The tangled web of password reuse. In NDSS,
volume 14, pages 23–26.
Eldefrawy, M. H., Alghathbar, K., and Khan, M. K.
(2011). Otp-based two-factor authentication using
mobile phones. In 2011 eighth international con-
ference on information technology: new generations,
pages 327–331. IEEE.
Jens ’atom’ Steube, Gabriele ’matrix’ Gristina (2015).
Hashcat advanced password recovery. https://hashcat.
net/hashcat/. Last checked on Aug 01, 2022.
Jover, R. P. (2020). Security analysis of sms as a second
factor of authentication. Communications of the ACM,
63(12):46–52.
Kumar, H., Kumar, S., Joseph, R., Kumar, D., Singh, S.
K. S., Kumar, A., and Kumar, P. (2013). Rainbow ta-
ble to crack password using md5 hashing algorithm.
In 2013 IEEE Conference on Information & Commu-
nication Technologies, pages 433–439. IEEE.
Last Pass (2022). Lastpass security his-
tory. https://www.lastpass.com/it/security/
what-if-lastpass-gets-hacked/. Last checked on
Aug 01, 2022.
Lenz, T. and Zwattendorfer, B. (2015). Enhancing the mod-
ularity and flexibility of identity management archi-
tectures for national and cross-border eid applications.
In 11th International Conference on Web Information
Systems and Technologies, pages 123–143. Springer.
Li, Z., He, W., Akhawe, D., and Song, D. (2014). The
{Emperor’s} new password manager: Security anal-
ysis of web-based password managers. In 23rd
USENIX Security Symposium (USENIX Security 14),
pages 465–479.
Manber, U. (1996). A simple scheme to make passwords
based on one-way functions much harder to crack.
Computers & Security, 15(2):171–176.
Mohammed, S., Ramkumar, L., and Rajasekar, V. (2017).
Password-based authentication in computer security:
Why is it still there. SIJ Trans. Comput. Sci. Eng. Its
Appl, 5:33–36.
NordPass (2022). Top 200 most common passwords. https:
//nordpass.com/it/most-common-passwords-list/.
Last checked on Aug 01, 2022.
OpenWall (1996). John the ripper. https://www.openwall.
com/john/. Last checked on Aug 01, 2022.
Pasquini, D., Cianfriglia, M., Ateniese, G., and Bernaschi,
M. (2021). Reducing bias in modeling real-world
password strength via deep learning and dynamic
dictionaries. In 30th USENIX Security Symposium
(USENIX Security 21), pages 821–838.
Shadow, D. (2022). Account Takeover in 2022. Technical
report.
Shirvanian, M., Jareckiy, S., Krawczykz, H., and Saxena, N.
(2017). Sphinx: A password store that perfectly hides
passwords from itself. In 2017 IEEE 37th Interna-
tional Conference on Distributed Computing Systems
(ICDCS), pages 1094–1104. IEEE.
Shirvanian, M., Price, C. R., Jubur, M., Saxena, N., Jarecki,
S., and Krawczyk, H. (2021). A hidden-password on-
line password manager. In Proceedings of the 36th An-
nual ACM Symposium on Applied Computing, pages
1683–1686.
Taha, M. M., Alhaj, T. A., Moktar, A. E., Salim, A. H., and
Abdullah, S. M. (2013). On password strength mea-
surements: Password entropy and password quality. In
2013 International Conference on Computing, Elec-
trical and Electronic Engineering (ICCEEE), pages
497–501. IEEE.
Tao, H. (2006). Pass-Go, a new graphical password
scheme. PhD thesis, University of Ottawa (Canada).
Yao, F. F. and Yin, Y. L. (2005). Design and analysis of
password-based key derivation functions. In Cryp-
tographers’ Track at the RSA Conference, pages 245–
261. Springer.
Zhang, Y., Monrose, F., and Reiter, M. K. (2010). The se-
curity of modern password expiration: An algorithmic
framework and empirical analysis. In Proceedings of
the 17th ACM conference on Computer and communi-
cations security, pages 176–186.
Zhang, Z., Liu, P., Wang, W., Li, S., Wang, P., and Jiang, Y.
(2020). High-performance password recovery hard-
ware going from gpu to hybrid cpu-fpga platform.
IEEE Consumer Electronics Magazine, 11(1):80–87.
The Ginger: Another Spice to Hinder Attacks on Password Files
173