【24h】

Breaking the Password Security Standards Using Offline Attacks and Public User Attributes

机译:使用脱机攻击和公共用户属性打破密码安全标准

获取原文

摘要

Password security standards based on the Shannon Entropy were made to ensure that users are protected from attacks. This research investigates the possibility of breaking the password security standards using offline attacks and public user attributes. The idea here is to reduce the keyspace by collecting a character set that is likely to be chosen as a password. Ten million compromised passwords were used to establish the Dictionary Character Set, while 1.4 billion compromised email accounts were used to establish the User-Attribute Character Set. Based on the experiments conducted, we proved that there is a high chance of breaking 8 – 10 character length passwords in a reasonable time. Dictionary and Attribute-Based attacks were proved to work in the wild based on cracking time and the number of compromised passwords in the datasets. Results show that it is possible to break the password standards using offline attacks and public user attributes in a reasonable time. A Machine Sensitive Key Based Password Strength Metric is then proposed based on the ratio of risk and safe probabilities of the password. The metric is based on the measurements gathered from the Brute Force, Dictionary and Attribute-Based Password Attacks.
机译:采取了基于Shannon Entropy的密码安全标准,以确保用户免受攻击的影响。本研究调查了使用脱机攻击和公共用户属性打破密码安全标准的可能性。这里的想法是通过收集可能被选为密码的字符集来减少keyspace。额外影响的密码用于建立字典字符集,而14亿个受损的电子邮件帐户用于建立User-Attribute字符集。基于进行的实验,我们证明了在合理的时间内突破8 - 10个字符长度密码的几率很高。证明基于字典和基于属性的攻击基于破解时间和数据集中受损密码的数量在野外工作。结果表明,可以在合理的时间内使用离线攻击和公共用户属性来打破密码标准。然后基于密码的风险和安全概率的比率提出基于机器敏感的密钥密码强度度量。度量标准基于从蛮力,字典和基于属性的密码攻击收集的测量值。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号