PARS is designed for both password database administrators and password security researchers. Administrators can use PARS to evaluate the security of their password databases by either dataset or individual passwords strength metrics/meters. Researchers can use PARS to conduct large-scale experiments using the comprehensive tools in the system.
PARS is created in Java thus theoretically could support any platform that one can run a JVM on. However while implementing the graphic user interface(GUI), we used an open sourced library “SWT (The Standard Widget Toolkit)” thus to use the GUI you must have a platform with SWT support.
PARS currently contains the 9 password cracking techniques discussed in the paper which includes:
- NS
- PCFG
- VCT
- OMEN
- n-gram
- JtR-W
- JtR-S
- JtR-I
- JtR-M
PARS currently contains 15 strength metrics and 8 strength meters from academia, and 15 commercial strength meters.
Academic Strength Meters:
Academic Strength Meters:
- NIST
- Ideal
- Regional
- CMU
- PCFG
- Adaptive
- BFM
- Weir
- PTG
Commercial Strength Meters:
- Yahoo!
- Bloomberg
- Target
- Battle
- Skype
- 12306.cn
- PayPal
- Medscape
- Intel
- Home Depot
- Fedex
- Microsoft
Oops, I forgot.