Decoy Password Vaults: At Least as Hard as Steganography?
نویسندگان
چکیده
Cracking-resistant password vaults have been recently proposed with the goal of thwarting offline attacks. This requires the generation of synthetic password vaults that are statistically indistinguishable from real ones. In this work, we establish a conceptual link between this problem and steganography, where the stego objects must be undetectable among cover objects. We compare the two frameworks and highlight parallels and differences. Moreover, we transfer results obtained in the steganography literature into the context of decoy generation. Our results include the infeasibility of perfectly secure decoy vaults and the conjecture that secure decoy vaults are at least as hard to construct as secure steganography.
منابع مشابه
Secure Data Hiding in Image over Encrypted Domain
Steganography is a concept of hiding or concealing data in a cover object while the sender and receiver are able to communicate within themselves. The security of data has been prime concern for the people from past and many research works are still going to find out convenient methods to safeguard the communication between people. Intruder can easily detect the information in the links as inte...
متن کاملSteganographic Approach for Data Hiding using LSB Techniques
Today’s all the multimedia work done via internet so it’s an urgent need to protect the data from malicious attacks. This lead to the research in the area of Digital watermarking and cryptography which intends to protect the copyright information of the intellectuals. In this paper a DCT based steganography scheme is proposed which provides higher resistance to image processing attacks such as ...
متن کاملInfluencing Self-Selected Passwords Through Suggestions and the Decoy Effect
We present results from an online experiment with the goal of nudging users towards stronger passwords. We explored the effect of suggesting different variations and constellations of passwords during password selection. In particular, we investigated whether the decoy effect can be applied here: When people face a choice between two options, adding a third, unfavorable option can influence the...
متن کاملThe Decoy Effect for Passwords – A First Exploration
This paper reports on an online survey eliciting effects of a decoy choice architecture for passwords. The survey measured preference for a given set of passwords and was conducted as a pre-study to a more interactive online-study to give us a feeling about the constraints of decoy passwords. The survey revealed that in some scenarios it is possible to influence the preference for a target pass...
متن کاملDeniable Storage Encryption for Mobile Devices
Deniable Storage Encryption for Mobile Devices Adam Skillen Smartphones, and other mobile computing devices, are being widely adopted globally as the de-facto personal computing platform. Given the amount of sensitive information accumulated by these devices, there are serious privacy and security implications for both personal use and enterprise deployment. Confidentiality of data-at-rest can ...
متن کامل