1. National Institute of Standards and Technology (NIST)
Special Publication 800-63B
Digital Identity Guidelines: Section 5.1.1
"Memorized Secrets
" discusses password security. While it mandates salting as the primary defense against pre-computation attacks (like rainbow tables)
it also emphasizes password length. A longer password dramatically increases the search space
making pre-computation for attacks like rainbow tables infeasible. The document states
"verifiers SHALL require memorized secrets to be at least 8 characters in length... Allowing longer memorized secrets
such as passphrases
is encouraged." This directly supports that a stronger policy (length) is a key mitigation factor.
2. Pfleeger
C. P.
Pfleeger
S. L.
& Margulies
J. (2015). Security in Computing (5th ed.). Pearson Education. In Chapter 5
"Passwords
" the text explains password vulnerabilities. It details how the size of the password space (determined by length and character set
i.e.
the password policy) is a critical factor in resisting brute-force and pre-computation attacks. A larger space makes creating comprehensive rainbow tables impractical.
3. Stanford University
CS 155: Computer and Network Security
Lecture 5: Web Security Model. Course materials explain that while salting is the direct defense against rainbow tables
password strength is a fundamental control. The lecture notes clarify that the effectiveness of any password cracking attack
including those using rainbow tables
is inversely proportional to the size of the password space
which is governed by password policies.