【24h】

DAHash: Distribution Aware Tuning of Password Hashing Costs

机译:DAHash:密码哈希成本的分发感知调整

获取原文
获取原文并翻译 | 示例

摘要

An attacker who breaks into an authentication server and steals all of the cryptographic password hashes is able to mount an offline-brute force attack against each user's password. Offline brute-force attacks against passwords are increasingly commonplace and the danger is amplified by the well documented human tendency to select low-entropy password and/or reuse these passwords across multiple accounts. Moderately hard password hashing functions are often deployed to help protect passwords against offline attacks by increasing the attacker's guessing cost. However, there is a limit to how "hard" one can make the password hash function as authentication servers are resource constrained and must avoid introducing substantial authentication delay. Observing that there is a wide gap in the strength of passwords selected by different users we introduce DAHash (Distribution Aware Password Hashing) a novel mechanism which reduces the number of passwords that an attacker will crack. Our key insight is that a resource-constrained authentication server can dynamically tune the hardness parameters of a password hash function based on the (estimated) strength of the user's password. We introduce a Stackelberg game to model the interaction between a defender (authentication server) and an offline attacker. Our model allows the defender to optimize the parameters of DAHash e.g., specify how much effort is spent in hashing weak/moderate/high strength passwords. We use several large scale password frequency datasets to empirically evaluate the effectiveness of our differentiated cost password hashing mechanism. We find that the defender who uses our mechanism can reduce the fraction of passwords that would be cracked by a rational offline attacker by up to 15%.
机译:闯入身份验证服务器并窃取所有加密密码哈希的攻击者能够对每个用户的密码发起离线暴力攻击。针对密码的离线暴力攻击越来越普遍,而有据可查的人类选择低熵密码和/或在多个帐户中重复使用这些密码的趋势放大了这种危险。通常会部署中等难度的密码哈希函数,以增加攻击者的猜测成本,从而帮助保护密码免受离线攻击。但是,由于身份验证服务器资源受限,因此使密码哈希功能的“难度”是有限的,并且必须避免引入大量的身份验证延迟。观察到不同用户选择的密码强度存在很大差距,我们引入了 DAHash(分发感知密码哈希),这是一种新颖的机制,可以减少攻击者破解的密码数量。我们的主要见解是,资源受限的身份验证服务器可以根据用户密码的(估计)强度动态调整密码哈希函数的硬度参数。我们引入了一个 Stackelberg 游戏来模拟防御者(身份验证服务器)和离线攻击者之间的交互。我们的模型允许防御者优化 DAHash 的参数,例如,指定在对弱/中等/高强度密码进行哈希处理上花费了多少精力。我们使用几个大规模密码频率数据集来实证评估我们的差异化成本密码哈希机制的有效性。我们发现,使用我们的机制的防御者可以将理性的离线攻击者破解的密码比例降低多达 15%。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号