1 j. alex halderman a convenient method for securely managing passwords j. alex halderman princeton...

17
1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

Upload: mercy-glenn

Post on 16-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

1 J. Alex Halderman

A Convenient Method for Securely Managing

PasswordsJ. Alex

HaldermanPrinceton

Brent WatersStanford

Edward W. Felten

Princeton

Page 2: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

2 J. Alex Halderman

• Web site password overloadGenerating, keeping secret, and recalling

passwords for scores of sites

• Leads to insecure coping techniques– Writing passwords down– Reusing same passwords

• Difficult to enforce better behaviorWe need to make password security

easy

****ing Passwords!

Page 3: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

3 J. Alex Halderman

In This Talk

1. Approaches to password management

2. Our construction and its security

3. Comparison with other techniques

4. Demonstration of our implementation

5. Future work and conclusions

Page 4: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

4 J. Alex Halderman

Approaches to Password Mgmt

• Local encrypted storagee.g., Password Safe (1998)– Cumbersome to access from multiple locations

• Centralized remote authenticatione.g., Microsoft Passport (1999)– Needs server-side changes, trusted third party

• Cryptographic password generatione.g., LPWA (1997), PwdHash (2004),

our scheme (2004)

Page 5: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

5 J. Alex Halderman

Password Generators

Master Password“amazon.com”

Hash()

“wrbPzdqS”Use as your Amazon password

A simple idea, but hard to get right!

• E.g.: LPWA, PwdHash• Client software derives

individual site passwords using deterministic one-way function

• Users sets all site passwords to function output

• Only need to remember master password to recreate all site passwords—highly transportable!

Page 6: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

6 J. Alex Halderman

==

Stealing the Master Password

Adversary learnspassword from low-security site

Password Guess

“yahoo.com”

Hash()

“RWwsYlTi”

“LZIniBNd” “LZIniBNd”

=?

Dictionary attack to learn master

password

Can access all otherpassword-managed

sites

“rover”“lassie”“spot”

“fido”

“LZIniBNd”“H2VeusSq”“CJPZfAKx” amazon.com wrbPzdqSgmail.com obIDmoglcitibank.com sX4rLlO1

“spot”

Easy to execute because scheme use fast hashes

Page 7: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

7 J. Alex Halderman

Thwarting Brute Force Attacks

attack cost = ½ × dictionary size × cost per guess

• Hard to increase dictionary sizeUser habits hard to change, limits on human memory

• Increase cost per guess by using slower hash– Used elsewhere to protect password verification

routines (UNIX crypt)– Our approach: iterated hash

• Security vs. usability tradeoff User has to wait too! — Cache intermediate results

Page 8: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

8 J. Alex Halderman

Our ConstructionMaster password

“MyD06ReX”User identity

[email protected]

Hk1()

“wrb8zdqS”User’s site passwordfor “amazon.com”

Hk2() Target site“amazon.com”

LocalCache

(k1 >> k2)Init

ializ

ati

on

Ph

ase

Gen

era

tion

Ph

ase

Mapping

Master password(again)

Page 9: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

9 J. Alex Halderman

Security Analysis

Four attack scenarios:1. No information2. Stolen site password3. Stolen cache data4. Stolen cache + site

password

Primary concern is offline attacks.

?

?

?

Increasingexternaldifficulty

Page 10: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

10 J. Alex Halderman

Security of Our Scheme

Attack scenarioHashes/guess

Time/guess

1. No information N/A N/A

2. Stolen site password k1+k2100.1s

3. Stolen cache data k1 100s

4. Stolen cache + site password

k2 0.1s

Page 11: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

11 J. Alex Halderman

Relative Attack Resistance

Estimated time to test 100,000 guesses

SchemeStolen password

Stolendata

Stolen pwand data

Password Safe

N/A 74.6 secs 74.6 secs

LPWA 0.5 secs N/A N/A

PwdHash 0.1 secs N/A N/A

Our Scheme 116 days 116 days 2.8 hours

Page 12: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

12 J. Alex Halderman

Equivalent Password Length

Our Scheme

LPWA

PwdHash

****

********

*********

Page 13: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

13 J. Alex Halderman

Password Multiplier• Extension for Mozilla Firefox

Windows, Mac OS X, and Linux

• Tightly integrated with browserDouble-click any password field to fill in

• Balanced security and convenience– Initialization — 108 iterations, ~100 seconds

(Only once per installation)– Password generation — 105 iterations, ~0.1

secs(Before every password operation)

Page 14: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

14 J. Alex Halderman

Password Multiplier — Demo

Page 15: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

15 J. Alex Halderman

Future Improvements• Flexible password formatting

Cope with sites that require numbers, punctuation, special patterns

• Easier password changesManually and at regular intervals

• Improved anti-spoofingAdopt techniques from PwdHash

• Port to Internet Explorer, others

Require additional “state”

Page 16: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

16 J. Alex Halderman

Summary — Our scheme:• Provides password access from anywhere our

software can be executed

• Asks user to remember only one short password

• Requires no server-side changes

• Does not require trusting a third-party service

• Nearly as secure as independent random pwds

• Likely much more secure than what you do now

• Is practical, available today, and freehttp://www.cs.princeton.edu/~jhalderm/projects/password/

Page 17: 1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

17 J. Alex Halderman

A Convenient Method for Securely Managing

PasswordsJ. Alex

HaldermanPrinceton

Brent WatersStanford

Edward W. Felten

Princeton