30.06.2013 Views

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.0 INTRODUCTION<br />

Chapter 3<br />

Research Methodology<br />

In Chapter 2, the relevant literature on password crack<strong>in</strong>g was reviewed <strong>in</strong> order to<br />

def<strong>in</strong>e the topic and the scope of the current research. A short tabulation of relevant<br />

published research <strong>in</strong> the area was also made. In this chapter, a selection of published<br />

works is reviewed <strong>in</strong> depth to locate the methodologies other researchers have used to<br />

do password crack<strong>in</strong>g (Section 3.1). These reviews are used to guide the development<br />

of a research methodology (Section 3.2). From the key problem areas of cost<br />

identified <strong>in</strong> Section 2.6, the research question, sub-questions, and hypothesis are<br />

developed. The data requirements and analysis are specified <strong>in</strong> Section 3.3. Section<br />

3.4 discusses the limitations of the proposed research methodology and Section 3.5<br />

provides a conclusion.<br />

3.1 REVIEW OF SIMILAR STUDIES<br />

A review of five published studies is made <strong>in</strong> the follow<strong>in</strong>g subsections <strong>in</strong> order to<br />

identify the methodologies used to do research <strong>in</strong> the area of password crack<strong>in</strong>g. Each<br />

study has a different perspective on the problem, but when viewed together an<br />

approach, a methodology, and methods can be derived to construct the methodology<br />

of this research. The first paper looks at survey method, the second at cluster<br />

methods, the third cost reduction methods, the fourth probabilistic methods, and the<br />

fifth parallel cluster<strong>in</strong>g techniques.<br />

3.1.1 A Survey of, and Improvements to, Password Security<br />

The researcher Kle<strong>in</strong> (1990) conducted a survey <strong>in</strong> which he outl<strong>in</strong>ed common threats<br />

to password security. He also performed password crack<strong>in</strong>g tests to identify the<br />

existence of these threats. Consequently, he proposed the use of a proactive password<br />

checker for the purpose of improv<strong>in</strong>g password security.<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!