Decoy Password Vaults: At Least as Hard as Steganography?

نویسندگان

  • Cecilia Pasquini
  • Pascal Schöttle
  • Rainer Böhme
چکیده

Cracking-resistant password vaults have been recently proposed with the goal of thwarting offline attacks. This requires the generation of synthetic password vaults that are statistically indistinguishable from real ones. In this work, we establish a conceptual link between this problem and steganography, where the stego objects must be undetectable among cover objects. We compare the two frameworks and highlight parallels and differences. Moreover, we transfer results obtained in the steganography literature into the context of decoy generation. Our results include the infeasibility of perfectly secure decoy vaults and the conjecture that secure decoy vaults are at least as hard to construct as secure steganography.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Data Hiding in Image over Encrypted Domain

Steganography is a concept of hiding or concealing data in a cover object while the sender and receiver are able to communicate within themselves. The security of data has been prime concern for the people from past and many research works are still going to find out convenient methods to safeguard the communication between people. Intruder can easily detect the information in the links as inte...

متن کامل

Steganographic Approach for Data Hiding using LSB Techniques

Today’s all the multimedia work done via internet so it’s an urgent need to protect the data from malicious attacks. This lead to the research in the area of Digital watermarking and cryptography which intends to protect the copyright information of the intellectuals. In this paper a DCT based steganography scheme is proposed which provides higher resistance to image processing attacks such as ...

متن کامل

Influencing Self-Selected Passwords Through Suggestions and the Decoy Effect

We present results from an online experiment with the goal of nudging users towards stronger passwords. We explored the effect of suggesting different variations and constellations of passwords during password selection. In particular, we investigated whether the decoy effect can be applied here: When people face a choice between two options, adding a third, unfavorable option can influence the...

متن کامل

The Decoy Effect for Passwords – A First Exploration

This paper reports on an online survey eliciting effects of a decoy choice architecture for passwords. The survey measured preference for a given set of passwords and was conducted as a pre-study to a more interactive online-study to give us a feeling about the constraints of decoy passwords. The survey revealed that in some scenarios it is possible to influence the preference for a target pass...

متن کامل

Deniable Storage Encryption for Mobile Devices

Deniable Storage Encryption for Mobile Devices Adam Skillen Smartphones, and other mobile computing devices, are being widely adopted globally as the de-facto personal computing platform. Given the amount of sensitive information accumulated by these devices, there are serious privacy and security implications for both personal use and enterprise deployment. Confidentiality of data-at-rest can ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017