DAHash: Distribution Aware Tuning of Password Hashing Costs
نویسندگان
چکیده
An attacker who breaks into an authentication server and steals all of the cryptographic password hashes is able to mount offline-brute force attack against each user’s password. Offline brute-force attacks passwords are increasingly commonplace danger amplified by well documented human tendency select low-entropy and/or reuse these across multiple accounts. Moderately hard hashing functions often deployed help protect offline increasing attacker’s guessing cost. However, there a limit how “hard” one can make hash function as servers resource constrained must avoid introducing substantial delay. Observing that wide gap in strength selected different users we introduce DAHash (Distribution Aware Password Hashing) novel mechanism which reduces number will crack. Our key insight resource-constrained dynamically tune hardness parameters based on (estimated) We Stackelberg game model interaction between defender (authentication server) attacker. allows optimize e.g., specify much effort spent weak/moderate/high passwords. use several large scale frequency datasets empirically evaluate effectiveness our differentiated cost mechanism. find uses reduce fraction would be cracked rational up $$15\%$$ .
منابع مشابه
Distribution-Aware Locality Sensitive Hashing
Locality Sensitive Hashing (LSH) has been popularly used in content-based search systems. There exist two main categories of LSH methods: one is to index the original data in an effective way to accelerate search process; the other one is to embed the high-dimensional data into hamming space and perform bit-wise operations to search similar objects. In this paper, we propose a new LSH scheme, c...
متن کاملPassword-Hashing Status
Computers are used in our everyday activities, with high volumes of users accessing provided services. One-factor authentication consisting of a username and a password is the common choice to authenticate users in the web. However, the poor password management practices are exploited by attackers that disclose the users’ credentials, harming both users and vendors. In most of these occasions t...
متن کاملThe MAKWA Password Hashing Function
We present the MAKWA password hashing function, which turns variable-length input data into a fixed-sized output, suitable for storage as a password verification token, or use as a password-derived symmetric encryption key. In order to cope with the inherent weakness of human-chosen passwords, MAKWA offers configurable slowness (with an adjustable work factor) and salting. The most important fe...
متن کاملThe M3dcrypt Password Hashing Function
M3dcrypt is a password hashing function built around the Advanced Encryption Standard (AES) algorithm and the arcfour pseudorandom function. It uses up to 256-bit pseudorandom salt values and supports 48-byte passwords.
متن کاملPerformance Analysis of Some Password Hashing Schemes
In this work we have analyzed some password hashing schemes for performance under various settings of time and memory complexities. We have attempted to benchmark the said algorithms at similar levels of memory consumption. Given the wide variations in security margins of the algorithms and incompatibility of memory and time cost settings, we have attempted to be as fair as possible in choosing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-662-64331-0_20