可行見解: 對於安全團隊,呢個指標可以整合到密碼創建API或Active Directory插件中,以提供實時、直觀嘅強度反饋(「你嘅密碼需要破解60%嘅猜測」)。對於研究人員,下一步必須係針對現實世界破解工具(如Hashcat或John the Ripper)進行嚴格、大規模嘅實證驗證,以校準模型。一個0.8嘅期望熵係咪真係意味住80%嘅搜索空間?呢個需要對抗性AI模型嘅證明,類似於GAN被用於攻擊其他安全領域嘅方式。呢個概念有前途,但其操作效用取決於透明、經過同行評審嘅驗證,超越機器生成密碼嘅受控環境。
NIST特別出版物 800-90B。 Recommendation for the Entropy Sources Used for Random Bit Generation.
J. Kelsey, K. A. McKay, M. Turan, "Predictive Models for Min-Entropy Estimation," 載於 Proceedings of CHES, 2015.
K. Reaz, G. Wunder, "ComPass: A Protocol for Secure and Usable Wi-Fi Device Provisioning," 載於 Proceedings of ACM WiSec, 2023. (根據上下文假設)。
C. E. Shannon, "A Mathematical Theory of Communication," The Bell System Technical Journal, 卷 27, 頁 379–423, 623–656, 1948.
R. V. L. Hartley, "Transmission of Information," The Bell System Technical Journal, 卷 7, 第 3 期, 頁 535–563, 1928.
J. Bonneau, "The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords," 載於 Proceedings of IEEE Symposium on Security and Privacy, 2012.
J. L. Massey, "Guessing and Entropy," 載於 Proceedings of IEEE International Symposium on Information Theory (ISIT), 1994.
C. Cachin, Entropy Measures and Unconditional Security in Cryptography. 博士論文, 蘇黎世聯邦理工學院, 1997.
J. O. Pliam, "The Disparity between Work and Entropy in Cryptology," 1998. [在線]。 可獲取:https://eprint.iacr.org/1998/024
B. Hitaj, P. Gasti, G. Ateniese, F. Perez-Cruz, "PassGAN: A Deep Learning Approach for Password Guessing," 載於 Proceedings of ACNS, 2019. (對抗性AI評估嘅外部參考)。