Cracking Passwords in Forensic Investigations - Scholarly ...
Cracking Passwords in Forensic Investigations - Scholarly ...
Cracking Passwords in Forensic Investigations - Scholarly ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
3.0 INTRODUCTION<br />
Chapter 3<br />
Research Methodology<br />
In Chapter 2, the relevant literature on password crack<strong>in</strong>g was reviewed <strong>in</strong> order to<br />
def<strong>in</strong>e the topic and the scope of the current research. A short tabulation of relevant<br />
published research <strong>in</strong> the area was also made. In this chapter, a selection of published<br />
works is reviewed <strong>in</strong> depth to locate the methodologies other researchers have used to<br />
do password crack<strong>in</strong>g (Section 3.1). These reviews are used to guide the development<br />
of a research methodology (Section 3.2). From the key problem areas of cost<br />
identified <strong>in</strong> Section 2.6, the research question, sub-questions, and hypothesis are<br />
developed. The data requirements and analysis are specified <strong>in</strong> Section 3.3. Section<br />
3.4 discusses the limitations of the proposed research methodology and Section 3.5<br />
provides a conclusion.<br />
3.1 REVIEW OF SIMILAR STUDIES<br />
A review of five published studies is made <strong>in</strong> the follow<strong>in</strong>g subsections <strong>in</strong> order to<br />
identify the methodologies used to do research <strong>in</strong> the area of password crack<strong>in</strong>g. Each<br />
study has a different perspective on the problem, but when viewed together an<br />
approach, a methodology, and methods can be derived to construct the methodology<br />
of this research. The first paper looks at survey method, the second at cluster<br />
methods, the third cost reduction methods, the fourth probabilistic methods, and the<br />
fifth parallel cluster<strong>in</strong>g techniques.<br />
3.1.1 A Survey of, and Improvements to, Password Security<br />
The researcher Kle<strong>in</strong> (1990) conducted a survey <strong>in</strong> which he outl<strong>in</strong>ed common threats<br />
to password security. He also performed password crack<strong>in</strong>g tests to identify the<br />
existence of these threats. Consequently, he proposed the use of a proactive password<br />
checker for the purpose of improv<strong>in</strong>g password security.<br />
31