The Long and Short of Passwords Rich Shay November 5, 2009 1 / 34 - - PowerPoint PPT Presentation

the long and short of passwords
SMART_READER_LITE
LIVE PREVIEW

The Long and Short of Passwords Rich Shay November 5, 2009 1 / 34 - - PowerPoint PPT Presentation

The Long and Short of Passwords The Long and Short of Passwords Rich Shay November 5, 2009 1 / 34 The Long and Short of Passwords Motivation for Studying Passwords Outline Motivation for Studying Passwords 1 2 Overview of Password Failure


slide-1
SLIDE 1

The Long and Short of Passwords

The Long and Short of Passwords

Rich Shay November 5, 2009

1 / 34

slide-2
SLIDE 2

The Long and Short of Passwords Motivation for Studying Passwords

Outline

1

Motivation for Studying Passwords

2

Overview of Password Failure

3

Cracking Passwords

4

Behold Entropy

5

My Own Work

2 / 34

slide-3
SLIDE 3

The Long and Short of Passwords Motivation for Studying Passwords

Motivating the Motivation

Numerous difficulties with text-based passwords Passwords can be cracked Complex passwords difficult to remember Users often inundated with many passwords So why do we use (and study) passwords?

3 / 34

slide-4
SLIDE 4

The Long and Short of Passwords Motivation for Studying Passwords

Passwords Enable Authentication

Systems need to authenticate users

Servers, ATMs, email, and many other computer services More and more websites enable users to create accounts

Passwords enable authentication

If I know my password, and no one else does, and system sees someone attempting to log in with my name and password, then that system can be reasonably certain the user is I

4 / 34

slide-5
SLIDE 5

The Long and Short of Passwords Motivation for Studying Passwords

Advantages of Passwords

Passwords already established and accepted People already familiar with using passwords Passwords require no added input hardware (unlike biometrics) Passwords can be used over a terminal like SSH (unlike graphical schemes) No extra devices to carry around (unlike ID cards)

5 / 34

slide-6
SLIDE 6

The Long and Short of Passwords Motivation for Studying Passwords

Mandatory Doom and Gloom Slide

Passwords often the only protection against intruder [Kuo et al., 2006, Summers & Bosworth, 2004] A single user becoming compromised can lead to an entire system becoming compromised [Bishop & Klein, 1995] Unless policy says otherwise, users tend to create very simple passwords [Bishop & Klein, 1995, Proctor et al., 2002, Leyden, 2003] Password policy can impact financial health of an

  • rganization [Robert M. Polstra, 2005]

6 / 34

slide-7
SLIDE 7

The Long and Short of Passwords Overview of Password Failure

Outline

1

Motivation for Studying Passwords

2

Overview of Password Failure

3

Cracking Passwords

4

Behold Entropy

5

My Own Work

7 / 34

slide-8
SLIDE 8

The Long and Short of Passwords Overview of Password Failure

How do Passwords Fail?

What is a password?

A short string of characters

What is a password used for?

To authenticate a user

On what assumptions does password depend?

User knows his or her password Only user knows his or her password

How do these assumptions fail?

User forgets (or fails to memorize) password Someone else learns password

8 / 34

slide-9
SLIDE 9

The Long and Short of Passwords Cracking Passwords

Outline

1

Motivation for Studying Passwords

2

Overview of Password Failure

3

Cracking Passwords

4

Behold Entropy

5

My Own Work

9 / 34

slide-10
SLIDE 10

The Long and Short of Passwords Cracking Passwords

Brute-Force Attacks

Brute-force attack consists of attacker trying different potential passwords until one works Shorter password more vulnerable than longer password Password with only letters more vulnerable than password with other characters

10 / 34

slide-11
SLIDE 11

The Long and Short of Passwords Cracking Passwords

Brute-Force Example

Consider password with 6 lower-case letters

Assuming all possible combinations equally likely, random guess has probability of 26−6, or one in 300 million

Consider password with 8 characters, using numbers and lower-case letters

Assuming all possible combinations equally likely, random guess has a probability of 36−8, or one in 2.8 trillion

11 / 34

slide-12
SLIDE 12

The Long and Short of Passwords Cracking Passwords

Dictionary Attacks

Attacker cracks password by trying every word in dictionary English dictionaries readily available

On your Mac, check out /usr/share/dict/web2

Cracking dictionaries exist

Check out http://www.openwall.com/wordlists/

Can combine words, and try modified words

12 / 34

slide-13
SLIDE 13

The Long and Short of Passwords Cracking Passwords

Social Engineering

Password length and complexity offer no protection In a 2003 study, 90% of users willing to divulge password for pen [Leyden, 2003] Recent phishing attack obtained 10,000 Hotmail passwords

13 / 34

slide-14
SLIDE 14

The Long and Short of Passwords Behold Entropy

Outline

1

Motivation for Studying Passwords

2

Overview of Password Failure

3

Cracking Passwords

4

Behold Entropy

5

My Own Work

14 / 34

slide-15
SLIDE 15

The Long and Short of Passwords Behold Entropy

Introducing Entropy

What does it mean for text to be “complicated”? Claude Shannon answered this in the 1940s and 1950s Wikipedia page has lots of useful information

wikipedia.org/wiki/Entropy_(information_ theory)

If you want a more in-depths understanding, I recommend

Shannon, C.E.: Prediction and entropy of printed English. Bell Systems Technical Journal (1951)

15 / 34

slide-16
SLIDE 16

The Long and Short of Passwords Behold Entropy

Entropy, explained by Wikipedia[Wikipedia, a]

Quantifies in bits the amount of information per character

Or, amount of information lost if character removed

A fair coin has an entropy of one bit H(X) = − n

i=1 p(xi)log2p(xi)

log base is often 2, to explain result in bits p(xi) is the probability that X equals xi When p(xi) is zero, p(xi)log2p(xi) is considered zero

Can be used to measure variance in text Applications to data compression, encryption

16 / 34

slide-17
SLIDE 17

The Long and Short of Passwords Behold Entropy

Entropy Example: Coin flip

Consider simple example: Flipping a Fair Coin Variable: X

X=H or X=T

H(X) = − n

i=1 p(xi)log2p(xi)

= −(p(X = H)log2p(X = H) + p(X = T)log2p(X = T)) = −( 1

2log2 1 2 + 1 2log2 1 2)

= −1 ∗ log2 1

2 = −1 ∗ −1 = 1

Therefore a fair coin flip represents one bit of information We need one bit of information to represent the result of a coin flip

17 / 34

slide-18
SLIDE 18

The Long and Short of Passwords Behold Entropy

Entropy and a Letter

Consider Entropy for a Random Letter

If α is randomly-chosen English letter, the probability that α is any particular letter is

1 26

Entropy for a randomly-chosen English letter is:

− P26

i=1 1 26log2 1 26

= −26 ∗

1 26log2 1 26

= −log2

1 26

= log226 = 4.7, rounded

Therefore, a randomly-selected English letter represents 4.7 bits of information We need approximately 4.7 bits to represent the value of

  • ne random letter

Therefore, if a password consists of ten randomly-selected letters, it has an entropy of 47 bits

18 / 34

slide-19
SLIDE 19

The Long and Short of Passwords Behold Entropy

Entropy and Unequal Frequency

But wait! English doesn’t use letters with equal frequency What happens when some letters are used more frequently than others?

Instead of each letter having a probability of

1 26, let’s

suppose that for a randomly occurring letter:

ten letters have a probability of

1 30

ten letters have a probability of

2 75

six letters have a probability of

1 15

Now the entropy of a random character is H(letter) = −(10 ∗ 1

30log2 1 30 + 10 ∗ 2 75log2 2 75 + 6 ∗ 1 15log2 1 15)

= 10 ∗ 1

30log230 + 10 ∗ 2 75log2 75 2 + 6 ∗ 1 15log215

= 1

3 ∗ 4.9 + 20 75 ∗ 5.2 + 6 15 ∗ 3.9 = 4.58

19 / 34

slide-20
SLIDE 20

The Long and Short of Passwords Behold Entropy

Entropy and English

When we make some letters slightly more likely than

  • thers, the entropy of a given letter changes from 4.7 to

4.58 In general, less variance leads to less entropy In fact, Shannon calculated that a given letter in English has an entropy of 1 This means that a letter of English text can be represented

  • n average by a single bit

20 / 34

slide-21
SLIDE 21

The Long and Short of Passwords My Own Work

Outline

1

Motivation for Studying Passwords

2

Overview of Password Failure

3

Cracking Passwords

4

Behold Entropy

5

My Own Work

21 / 34

slide-22
SLIDE 22

The Long and Short of Passwords My Own Work

A Brief Overview of My Prior Work

A comprehensive simulation tool for the analysis of password policies

Richard Shay and Elisa Bertino [Shay & Bertino, 2009] International Journal of Information Security Springer, 2009

Simulating users and their password policies in an

  • rganization

Studies impact of password policy on financial health of

  • rganization

Most citations in this presentation taken from the paper Download at http://richshay.com/files

22 / 34

slide-23
SLIDE 23

The Long and Short of Passwords My Own Work

The Model Components

Parameters can be defined for users, accounts, services Users, services have daily fixed cost Users generate income by using accounts to access services

23 / 34

slide-24
SLIDE 24

The Long and Short of Passwords My Own Work

Password Lifecycle Model

Each account has exactly

  • ne password

Policy dictates password length, complexity, change frequency Password changed when it expires, users suspects account compromised, user forgets password User with password not memorized writes it down

24 / 34

slide-25
SLIDE 25

The Long and Short of Passwords My Own Work

User Memorization

Users subjected to memory checks with new password Checks continue until users memorizes password Until user has memorized password, user writes it down Probability of success of check depends on:

User probability of memorizing seven-digit phone number (entered) Variable indicating how quickly the user learns (entered, 0 to 1) Complexity of password (per-character entropy*length, entered) How long user has been using password How many new passwords the user creates daily, average

25 / 34

slide-26
SLIDE 26

The Long and Short of Passwords My Own Work

Threat Model

If an account is compromised, all services it uses are compromised Compromised services produce admin-specified fraction of usual income, and may have added daily cost Compromised service remains compromised until all accounts tethered to it are no longer compromised Compromised account remains compromised until its password changes

26 / 34

slide-27
SLIDE 27

The Long and Short of Passwords My Own Work

Becoming Compromised: Internal

Each day that a user’s password is written down, there is a daily probability that the user becomes compromised because of this This probability is specified by administrator Represents threat created by user writing down password by computer

27 / 34

slide-28
SLIDE 28

The Long and Short of Passwords My Own Work

Becoming Compromised: Modeling Cracking

My favorite part of the model! Each user subjected to a specified number of daily brute-force attacks Each account has a password with a specified length and per-character entropy Therefore, each password has a specified total entropy H This means that the password is represented by one configuration of H bits Therefore, a random brute-force attack has a probability of success of

1 2H

28 / 34

slide-29
SLIDE 29

The Long and Short of Passwords My Own Work

Result Methodology

Results examine how changing input parameters changes end financial balance Y-axis is end financial balance of simulated organization

Higher final balance indicates less money lost due to security breaches Security breaches lead to added costs and reduced income Therefore balance is measure of policy success

X-axis shows parameters in question Each point shows mean balance of several runs Program has many input parameters; the rest held constant Experiments created through graphical interface Model capable of many other experiments

29 / 34

slide-30
SLIDE 30

The Long and Short of Passwords My Own Work

Experiment One

Result of increasing password complexity

Password Entropy

350000 370000 390000 410000 430000 450000 470000 490000 510000 530000 1 2 3 4 5 6 7 Per-Character Entropy Balance

30 / 34

slide-31
SLIDE 31

The Long and Short of Passwords My Own Work

Experiment Two

Result of increasing duration of password life

Password Expiration

8000000 8500000 9000000 9500000 10000000 10500000 11000000 11500000 12000000 12500000 50 100 150 200 250 300 350 Password Expires, days Balance

31 / 34

slide-32
SLIDE 32

The Long and Short of Passwords My Own Work

Experiment Three

Shared vs individual services as external attacks increase

Sharing Services

20000 40000 60000 80000 100000 120000 140000 160000 180000 200000 20 40 60 80 100 120 140 160 180 200 Attacks per Day Balance Individual Services Shared Services

32 / 34

slide-33
SLIDE 33

The Long and Short of Passwords My Own Work

Experiment Four

Shared vs individual services as organization grows

Number of Users

50000 100000 150000 200000 250000 300000 10 20 30 40 50 60 70 80 90 100 Number of Users Balance Individual Services Shared Services

33 / 34

slide-34
SLIDE 34

The Long and Short of Passwords My Own Work

Further Work?

I’ve been considering how best to release this as an

  • pen-source project

Let me know if you have any ideas for researching using this program

34 / 34

slide-35
SLIDE 35

The Long and Short of Passwords My Own Work

Bishop, M. & Klein, D. V. (1995). Computers and Security14, 14 (3), 233–249. Kuo, C., Romanosky, S., & Cranor, L. F . (2006). In: SOUPS ’06: Proceedings of the second symposium on Usable privacy and security pp. 67–78, New York, NY, USA: ACM Press. Leyden, J. (2003). The Register, . Proctor, R. W., Lien, M.-C., Vu, K.-P . L., Schultz, E. E., & Salvendy, G. (2002). Behavior Research Methods, Instruments, and Computers, 34 (2), 163–169. Robert M. Polstra, I. (2005).

34 / 34

slide-36
SLIDE 36

The Long and Short of Passwords My Own Work

In: InfoSecCD ’05: Proceedings of the 2nd annual conference on Information security curriculum development

  • pp. 135–138, New York, NY, USA: ACM Press.

Shay, R. & Bertino, E. (2009).

  • Int. J. Inf. Sec. 8 (4), 275–289.

Summers, W. C. & Bosworth, E. (2004). In: WISICT ’04: Proceedings of the winter international synposium on Information and communication technologies

  • pp. 1–6, Trinity College Dublin.

Wikipedia (a). http://en.wikipedia.org/wiki/Entropy (information theory).

34 / 34