PASSWORDS
CS682: Advanced Security Topics
Vasiliki Panteli
3/9/2020 Passwords 1
PASSWORDS CS682: Advanced Security Topics Vasiliki Panteli - - PowerPoint PPT Presentation
PASSWORDS CS682: Advanced Security Topics Vasiliki Panteli 3/9/2020 Passwords 1 Passwords Passwords is a user authentication mechanism that is widely adopted for many years Methods for user authentication: Something you know
CS682: Advanced Security Topics
Vasiliki Panteli
3/9/2020 Passwords 1
mechanism that is widely adopted for many years
3/9/2020 Passwords 2
3/9/2020 Passwords 3
Bonneau J., Herley C., Van Oorschot P. C., Stajano F.
3/9/2020 Passwords 4
security problems
any of the numerous proposals from the research community
3/9/2020 Passwords 5
already proposed password-replacement schemes
proposals
replacement schemes (9 of them are analyzed in the paper)
3/9/2020 Passwords 6
secrets at all.
everything.
3/9/2020 Passwords 7
3/9/2020 Passwords 8
3/9/2020 Passwords 9
3/9/2020 Passwords 10
3/9/2020 Passwords 11
specific goal for which the scheme is being compared
3/9/2020 Passwords 12
STEP1 • Examine and score each individual scheme on each benefit STEP2
benefits each offers over the other
STEP3
relative importance of the benefit
3/9/2020 Passwords 13
ARE ARE NOT
10.Non-Proprietary 11.Resilient-to-Theft 12.No-Trusted-Third-Party 13.Unlinkable
3/9/2020 Passwords 14
3/9/2020 Passwords 15
User Website 1 password Website 2 password Website 3 password
Mozilla Firefox
master password
3/9/2020 Passwords 16
IS IS NOT
1. Scalable-for-Users 2. Easy-to-Learn 3. Efficient-to-Use 4. Infrequent-Errors 5. Resilient-to-Phishing 6. Resilient-to-Theft 7. No-Trusted-Third-Party 8. Requiring-Explicit-Consent 9. Unlinkable
3/9/2020 Passwords 17
User Single Sign-On Website 1 Website 2 Website 3
3/9/2020 Passwords 18
IS IS NOT
1. Scalable-for-Users 2. Nothing-to-Carry 3. Efficient-to-Use 4. Infrequent-Errors 5. Easy-Recovery-from-Loss 6. Accessible 7. Negligible-Cost-per-User 8. Mature 9. Non-Proprietary
1. Server-Compatible 2. Resilient-to-Internal-Observation 3. Resilient-to-Phishing 4. Unlinkable 5. No-Trusted-Third-Party
3/9/2020 Passwords 19
User Login
IS IS NOT
3/9/2020 Passwords 20
3/9/2020 Passwords 21
User
Choose a pattern
User
2 4 5 6 4 6 8 5 4 9 6 4 6 7 8 5 4 7 9 5 7 8 5 Write the pattern
IS IS NOT
3/9/2020 Passwords 22
3/9/2020 Passwords 23
3/9/2020 Passwords 24
authentication proposal using this framework and adjusting it to their needs:
3/9/2020 Passwords 25
3/9/2020 Passwords 26
Das, A., Bonneau, J., Caesar, M., Borisov, N., & Wang, X. (2014, February)
3/9/2020 Passwords 27
benefit the attackers
passwords
3/9/2020 Passwords 28
examine one password composition policy
modifications)
3/9/2020 Passwords 29
3/9/2020 Passwords 30
password at different sites
password composition policies
3/9/2020 Passwords 31
help users to choose stronger passwords.
categories:
3/9/2020 Passwords 32
passwords
least two passwords leaked:
crack hashed passwords
3/9/2020 Passwords 33
Distance-like functions Manhattan Cosine Edit-distance like functions Levenshtein Damerau-Levenshtein Token-based distance functions Dice Overlap Alignment-like functions Smith-Waterman Neddleman Wunsch Largest Common Subsequence (LCS)
3/9/2020 Passwords 34
3/9/2020 Passwords 35
Different users – Same Websites Different users – Different websites
Within the same website or different website different users use significantly different passwords
3/9/2020 Passwords 36
Same users – Different Websites:
40% of the passwords have similarity score [0.9, 1.0]
Same users – Different websites Non-identical passwords:
30% of the non-identical passwords have similarity score [0.8, 1.0]
We find that same users tend to reuse/modify their passwords.
understand why users modify their passwords and what modifications they do
several departments at universities
3/9/2020 Passwords 37
reuse existing passwords when choosing a password for a new account.
password digits or symbols.
passwords to fulfill password constraints enforced by the different websites.
passwords.
3/9/2020 Passwords 38
3/9/2020 Passwords 39
Leaked Password Candidate Password 1 Candidate Password 2 Candidate Password 3 Candidate Password 4
Guessing Algorithm
3/9/2020 Passwords 40
modified:
“qwer” -> “qwert”
“qwer” -> “1234”
3/9/2020 Passwords 41
the original one
the back and then the combination of both.
3/9/2020 Passwords 42
3/9/2020 Passwords 43
front, then back and the combination of both.
3/9/2020 Passwords 44
3/9/2020 Passwords 45
3/9/2020 Passwords 46
to the same group of {Digit, Symbol, Uppercase letter, Lowercase letter}
3/9/2020 Passwords 47
3/9/2020 Passwords 48
suitable for online attacks
3/9/2020 Passwords 49
algorithm was successful in predicting similar passwords.
the similarity score of all the password pairs that they successfully cracked.
3/9/2020 Passwords 50
3/9/2020 Passwords 51
3/9/2020 Passwords 52