Honeywords
Making Password-Cracking Detectable By Ari Juels and Ronald L. Rivest Presented by Nunzio Cicone and Hans-Peter Höllwirth
Honeywords Making Password-Cracking Detectable By Ari Juels and - - PowerPoint PPT Presentation
Honeywords Making Password-Cracking Detectable By Ari Juels and Ronald L. Rivest Presented by Nunzio Cicone and Hans-Peter Hllwirth Setting Password Attacks Passwords are a notoriously weak authentication mechanism One significant
Making Password-Cracking Detectable By Ari Juels and Ronald L. Rivest Presented by Nunzio Cicone and Hans-Peter Höllwirth
6 million hashed user passwords stolen from LinkedIn in 2012 Hashed passwords of Evernote‘s 50 million users stolen in 2013
them and then hashing the result again
honeychecker
User Password Bob HoneywordA Bob HoneywordB Bob RealPassword Bob HoneywordC Bob HoneywordD Users Check Alice 1 James 5 Nick 5 Bob 3 Emily 4 Login Attempt User: Bob Password: RealPassword Main Server Honeychecker Check( 3 )
User Password Bob HoneywordA Bob HoneywordB Bob RealPassword Bob HoneywordC Bob HoneywordD Users Check Alice 1 James 5 Nick 5 Bob 3 Emily 4 Main Server Honeychecker Login Attempt User: Bob Password: HoneywordA Check( 1 )
from generated honeywords
honeyword generation
honeywords
randomly-chosen character of the same type
Example where t = 4 BG+1a745 -> BG+7a305 BG+2a177 BG+9a587 BG+0a602
Example mice3blind -> gold5rings name8honey flat7sorts
Propose a password: myPassword Append “413” to password. Enter new password: myPassword413
Generated honeywords: myPassword798 myPassword982 myPassword113 myPassword056 myPassword935 myPassword664
abacad513 snurfle672 zinja897 abacad941 snurfle134 zinja320 abacad004 snurfle845 zinja461 abacad752 snurfle772 zinja389
popular passwords
authenticated
failover state
becomes available again
generated and occasionally include them
attacker to know for sure that the user generated password has been found
kerfluffle892, kerfluffle200, kerfluffle651, kerfluffle875, kerfluffle023
effectiveness of honeywords
honeyword on two different systems
convenient authentication methods
passwords