



1) limited and uniformly distributed, 2) limited, complex and uniformly distributed, 3) unlimited and uniformly distributed, 4) unlimited and non-uniformly distributed message space. Furthermore, this paper presents four SEIGuard scheme designs and algorithms for 4 typical social engineering information objects (mobile phone number, identification number, email address, personal name), which represent 4 different types of message space, i.e. This scheme eliminates the anchor that both online and offline brute-force attacks depending on. And these two situations share the same undifferentiated backend procedures. During the login, the server doesn't check the login passwords, correct passwords decrypt ciphertexts to be correct plaintexts incorrect passwords decrypt ciphertexts to be phony but plausible-looking plaintexts (sampled from the same distribution).
#Iguard windows10 password
The login password merely serves as a temporary key to encrypt SEI and there is no password plaintext or ciphertext stored in the database. In SEIGuard, the password check in authentication is omitted and this design is further combined with the SEI encryption design using honey encryption. This paper proposes an authentication-simplified and deceptive scheme (SEIGuard) to protect server-side social engineering information (SEI) and other information against brute-force attacks.
