practical password recovery on an practical password
play

Practical Password Recovery on an Practical Password Recovery on an - PowerPoint PPT Presentation

Practical Password Recovery on an Practical Password Recovery on an MD5 Challenge/Response such as MD5 Challenge/Response such as APOP * APOP * Yu Sasaki ( The University of Electro-Communications ) Go Yamamoto (NTT) Kazumaro Aoki (NTT)


  1. Practical Password Recovery on an Practical Password Recovery on an MD5 Challenge/Response such as MD5 Challenge/Response such as APOP * APOP * Yu Sasaki ( The University of Electro-Communications ) Go Yamamoto (NTT) Kazumaro Aoki (NTT) (http://eprint.iacr.org/2007/101) * We notified Information-technology Promotion Agency, Japan of the result followed by the Japanese ordinance, December 8, 2006. The notification number is IPA#10155887.

  2. Background of Our Activity 1 Background of Our Activity 1 Tomorrow, Leurent will present the almost same result. (Research motivation is different. ) Important point We have independently done the same research, but not submitted yet. From October to November. When did we do? Finished before FSE submission. Because we considered Why didn’t we submit? security problems. 2

  3. Background of Our Activity 2 Background of Our Activity 2 • IPA requests to report some vulnerability of widely used software products. • We respected the IPA’s policy so that we did not submit to conferences. IPA Report We didn’t submit Conference Research lab at that time 3

  4. Collision Impacts the Security of Collision Impacts the Security of Challenge/Response Challenge/Response Authentication Authentication Recently, collision resistance of several hash functions were broken. Some researches apply collision to applications. How about challenge/response authentication? We show collisions are used to recover user’s secret information in prefix C/R authentication such as APOP . (Only MD5 is used in APOP) Challenge : C , Response : MD5( C || Secret ) 4

  5. APOP and Chosen Challenge APOP and Chosen Challenge Attack Attack C ’ (Attacker’s choice) server C user R =MD5( C || pass ) R’ =MD5( C’ || pass ) Authenticate Authenticate pass New mail No new mail attacker (hijack insecure router) We found, in Man-in-the-Middle environment, attacker can recover the first 3 characters of password. 5

  6. Attack Procedure Attack Procedure 1. Fix the last 8 bits of M to be a character we guess. 2. Choose free part to yield a collision. 3. Send C1,C2 to user, get responses R1,R2 . 4. if R1=R2 , guess is correct. common string M1 assword C1 P PAD M2 C2 assword P PAD Set a char we guess. Free part. Choose to make collision. When recover more characters, fixed part will be long. C1 ssword P a PAD M1 C2 P a ssword PAD M2 6

  7. Conclusion and Future Work Conclusion and Future Work • We showed how to recover 3 chars of APOP password. • By combining exhaustive search, 8-9 chars are recovered. • This is the first result applying collision to C/R authentication. Why recoverable number is 3? We use Wang’s collision attack that has a difference in the latter part of messages. C1 > a s P > a s P C2 ⊿ M Can’t hold more identical values. 7

  8. Statement In RFC : Secrets should be long strings (considerably longer than 8-character) Some may say recovering 3 characters is not enough , it’s not vulnerability . We tried extension of APOP Attack. We tried extension of APOP Attack. Continue to next talk. Continue to next talk. Thank you for your attention !! Thank you for your attention !!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend