可操作的洞見: 對於安全團隊,此指標可以整合到密碼創建API或Active Directory外掛程式中,以提供即時、直觀的強度回饋(「您的密碼需要破解60%的猜測」)。對於研究人員,下一步必須是針對真實世界的破解工具(如Hashcat或John the Ripper)進行嚴謹、大規模的實證驗證,以校準模型。期望熵0.8是否真的意味著80%的搜尋空間?這需要對抗性AI模型(類似於GAN用於攻擊其他安全領域的方式)的證明。這個概念很有前景,但其操作實用性取決於在機器生成密碼的受控環境之外,進行透明、經過同行評審的驗證。
NIST Special Publication 800-90B. Recommendation for the Entropy Sources Used for Random Bit Generation.
J. Kelsey, K. A. McKay, M. Turan, "Predictive Models for Min-Entropy Estimation," in Proceedings of CHES, 2015.
K. Reaz, G. Wunder, "ComPass: A Protocol for Secure and Usable Wi-Fi Device Provisioning," in Proceedings of ACM WiSec, 2023. (根據上下文假設)。
C. E. Shannon, "A Mathematical Theory of Communication," The Bell System Technical Journal, vol. 27, pp. 379–423, 623–656, 1948.
R. V. L. Hartley, "Transmission of Information," The Bell System Technical Journal, vol. 7, no. 3, pp. 535–563, 1928.
J. Bonneau, "The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords," in Proceedings of IEEE Symposium on Security and Privacy, 2012.
J. L. Massey, "Guessing and Entropy," in Proceedings of IEEE International Symposium on Information Theory (ISIT), 1994.
C. Cachin, Entropy Measures and Unconditional Security in Cryptography. PhD Thesis, ETH Zurich, 1997.
J. O. Pliam, "The Disparity between Work and Entropy in Cryptology," 1998. [線上]. 可取得:https://eprint.iacr.org/1998/024
B. Hitaj, P. Gasti, G. Ateniese, F. Perez-Cruz, "PassGAN: A Deep Learning Approach for Password Guessing," in Proceedings of ACNS, 2019. (用於對抗性AI評估的外部參考)。