论文标题

密码:分裂他们站立,统一他们跌倒

Passwords: Divided they Stand, United they Fall

论文作者

Tupsamudre, Harshal, Lodha, Sachin

论文摘要

如今,离线攻击是对密码安全性最严重的威胁之一。这些攻击声称来自Yahoo,LinkedIn,Twitter,Sony,Adobe等知名网站的密码数百万。因此,作为一种预防措施,有必要衡量密码数据库的离线猜测阻力,并帮助用户选择安全密码。依赖最小密码长度和不同字符类的基于规则的机制太幼稚,无法捕获复杂的人类行为,而基于概率模型的机制则需要了解整个密码分布的知识,这并不总是容易学习。在本文中,我们提出了一个空间分区攻击模型,该模型使用以前的泄漏,调查,攻击和其他来源中的信息将密码搜索空间分为非重叠的分区并学习分区密度。我们证明,如果以降低的密度顺序探索所得分区,则分区攻击者的预期成功是最大的。我们表明,拟议的攻击模型更加通用,并且各种流行的攻击技术,包括基于概率的,基于词典的基于语法和蛮力的攻击技术只是分区攻击者的不同实例。后来,我们介绍了Bin Attacker,这是分区攻击者的另一个实例,并测量现实世界密码数据库的猜测阻力。我们证明了利用的搜索空间很小,因此,即使弱攻击者也会对系统造成足够的损害。我们证明,只有在分区密度均匀的情况下,才能对分区攻击进行反击。我们使用此结果,并提出了一个系统,该系统通过在不同分区中分配用户来阻止分区攻击者。最后,我们演示了如何对一些知名密码方案进行调整,以帮助用户从系统分配的分区中选择密码。

Today, offline attacks are one of the most severe threats to password security. These attacks have claimed millions of passwords from prominent websites including Yahoo, LinkedIn, Twitter, Sony, Adobe and many more. Therefore, as a preventive measure, it is necessary to gauge the offline guessing resistance of a password database and to help users choose secure passwords. The rule-based mechanisms that rely on minimum password length and different character classes are too naive to capture the intricate human behavior whereas those based on probabilistic models require the knowledge of an entire password distribution which is not always easy to learn. In this paper, we propose a space partition attack model which uses information from previous leaks, surveys, attacks and other sources to divide the password search space into non-overlapping partitions and learn partition densities. We prove that the expected success of a partition attacker is maximum if the resulting partitions are explored in decreasing order of density. We show that the proposed attack model is more general and various popular attack techniques including probabilistic-based, dictionary-based, grammar-based and brute-force are just different instances of a partition attacker. Later, we introduce bin attacker, another instance of a partition attacker, and measure the guessing resistance of real-world password databases. We demonstrate that the utilized search space is very small and as a result even a weak attacker can cause sufficient damage to the system. We prove that partition attacks can be countered only if partition densities are uniform. We use this result and propose a system that thwarts partition attacker by distributing users across different partitions. Finally, we demonstrate how some of the well-known password schemes can be adapted to help users in choosing passwords from the system assigned partitions.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源