Title: Passwords
1Passwords No Longer Viable
Arvind Narayanan Vitaly Shmatikov Univ. of Texas
at Austin (stuck in cowboy country ?)
2Greek mythology Kerberos is tamed by the Lyre of
Orpheus
3Today Candy breaks computer security
70 of people will give up their password for a
candy bar!
4Secure, Easy to Remember Pick any one
Organizations implement cumbersome password
rules require mixed case, numerals, special
characters, etc. The goal is for passwords to be
secure as well as easy to remember. We show
that there is an inherent conflict between these
goals!
5Password
Modeling Human Password Generation
6Memorability vs. Security
- Assume we had a fast algorithm that perfectly
reproduces the Morph procedure. - Memorability is inversely related to randomness.
- Cryptanalysis time is directly related to
randomness. - So memorability and cryptanalysis time are
inversely related if we can precisely model
human password generation!
7One of our techniques - Markov Modeling
- sasetcki
- eshembec
- ertemenu
- sleeteat
- methesen
- wovmgrbl
- vfxalnre
- gnhkzdhl
- ejvzhrfb
- sxnsmvql
The words on the right were generated using
MM1 They are more pronouncable than random
character strings, on the left.
8Keyspace reduction factor
Coverage
With 80 coverage we can get 25-fold compression!
9Current state of the art Rainbow attack
- Word list size is 3 x 1012
- All alphanumeric passwords of length 8
- Compressed database size is 48 GB
- Cryptanalysis time is 40 minutes
- Amortized time is only 10 minutes
What we did
- Extend timespace tradeoff to implicit
dictionaries. - Same efficiency as rainbow attack, increased
coverage.
10Coverage comparison
Word list size for above results was about 2 x
109 With a larger word list size of 3 x 1012,
we believe we can get a 90 success rate.
11If not passwords, then what?
- What about biometric?
- Biometric identification is good.
- Biometric authentication is brain-damaged.
- PAKE (Password based Authenticated Key Exchange)
- Good for some, but not all scenarios.
- Serge will talk about it tomorrow (and Zully
- later today).
12BOFH syndrome
Dont blame users, blame poor system
usability! If users stick their passwords on
their monitors, it doesnt mean theyre
stupid. It means the security engineering needs
rethinking.
13Smart cards
- Reduce electronic security to
- physical security.
- Protection mechanisms such
- as RFID based tracking exist.
- Economic, legal and law
- enforcement infrastructure to
- deal with compromise.
14Find out more at CCS 2005.
Alexandria, VA
15Thank you. Enjoy your beer ?