skip to main content
10.1145/1102120.1102168acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Fast dictionary attacks on passwords using time-space tradeoff

Published:07 November 2005Publication History

ABSTRACT

Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to brute-force dictionary attacks, many organizations enforce complicated password-creation rules and require that passwords include numerals and special characters. We demonstrate that as long as passwords remain human-memorable, they are vulnerable to "smart-dictionary" attacks even when the space of potential passwords is large.Our first insight is that the distribution of letters in easy-to-remember passwords is likely to be similar to the distribution of letters in the users' native language. Using standard Markov modeling techniques from natural language processing, this can be used to dramatically reduce the size of the password space to be searched. Our second contribution is an algorithm for efficient enumeration of the remaining password space. This allows application of time-space tradeoff techniques, limiting memory accesses to a relatively small table of "partial dictionary" sizes and enabling a very fast dictionary attack.We evaluated our method on a database of real-world user password hashes. Our algorithm successfully recovered 67.6% of the passwords using a 2 x 109 search space. This is a much higher percentage than Oechslin's "rainbow" attack, which is the fastest currently known technique for searching large keyspaces. These results call into question viability of human-memorable character-sequence passwords as an authentication mechanism.

References

  1. MD5 online cracking using rainbow tables. http://www.passcracking.com/.]]Google ScholarGoogle Scholar
  2. M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. EUROCRYPT '00, volume 1807 of LNCS, pages 139--155. Springer, 2000.]]Google ScholarGoogle Scholar
  3. S. Bellovin and M. Merritt. Encrypted key exchange: password-based protocols secure against dictionary attacks. In Proc. IEEE Security and Privacy Symposium, pages 72--84. IEEE Computer Society, 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Booker. The Nth prime algorithm. http://primes.utm.edu/nthprime/algorithm.php, 2005.]]Google ScholarGoogle Scholar
  5. J. Borst, B. Preneel, and J. Vandewalle. On the time-memory tradeoff between exhaustive key search and table precomputation. In Proc. 19th Symposium on Information Theory in the Benelux, pages 111--118, 1998.]]Google ScholarGoogle Scholar
  6. V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proc. EUROCRYPT '00, volume 1807 of LNCS, pages 156--171. Springer, 2000.]]Google ScholarGoogle Scholar
  7. W. Burr, D. Dodson, and W. Polk. Electronic authentication guideline. NIST Special Publication 800-63, 2004.]]Google ScholarGoogle Scholar
  8. D. Davis, F. Monrose, and M. Reiter. On user choice in graphic password schemes. In Proc. 13th USENIX Security Symposium, pages 151--164. USENIX, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Denning. Cryptography and Data Security. Addison-Wesley, 1982.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. C. Feldmeier and P. R. Karn. UNIX password security - ten years later. In Proc. CRYPTO '89, volume 435 of LNCS, pages 44--63. Springer, 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Fiat and M. Naor. Rigorous time/space tradeoffs for inverting functions. In Proc. STOC '91, pages 534--541. ACM, 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. D. Forney. The Viterbi algorithm. Proceedings of the IEEE, 61(3):268--278, 1973.]]Google ScholarGoogle ScholarCross RefCross Ref
  13. C. Gentry, P. MacKenzie, and Z. Ramzan. Password authenticated key exchange using hidden smooth subgroups. In these proceedings, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. O. Goldreich and Y. Lindell. Session-key generation using human random passwords. In Proc. CRYPTO '01, volume 2139 of LNCS, pages 408--432. Springer, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. L. Griffiths and J. B. Tenenbaum. Probability, algorithmic complexity, and subjective randomness. In Proceedings of the 25th Annual Conference of the Cognitive Science Society, 2003.]]Google ScholarGoogle Scholar
  16. T. L. Griffiths and J. B. Tenenbaum. From algorithmic to subjective randomness. In Advances in Neural Information Processing Systems 16, 2004.]]Google ScholarGoogle Scholar
  17. M. Hellman. A cryptanalytic time-memory tradeoff. IEEE Transactions on Information Theory, 26:401--406, 1980.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In Proc. 8th USENIX Security Symposium, pages 135--150. USENIX, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Proc. EUROCRYPT '01, volume 2045 of LNCS, pages 475--494. Springer, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. B. Kerbs. DNA key to decoding human factor. The Washington Post, March 28, 2005. http://www.washingtonpost.com/wp-dyn/articles/A6098-2005Mar28.html.]]Google ScholarGoogle Scholar
  21. K. Kusuda and T. Matsumoto. Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32 and Skipjack. IEICE Transactions on Fundamentals, E79-A(1):35--48, 1996.]]Google ScholarGoogle Scholar
  22. K. Kusuda and T. Matsumoto. Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size. TIEICE: IEICE Transactions on Communications/Electronics/Information and Systems, 1999.]]Google ScholarGoogle Scholar
  23. R. Li and P. Vitanyi. An Introduction to Kolmogorov Complexity and Its Applications. Springer, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. S. Lucks. Open key exchange: how to defeat dictionary attacks without encrypting public keys. In Proc. Security Protocols Workshop, volume 1361 of em LNCS. Springer, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. G. A. Miller. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63:81--97, 1956.]]Google ScholarGoogle ScholarCross RefCross Ref
  26. F. Monrose, M. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. International Journal of Information Security, 1(2):69--93, 2002.]]Google ScholarGoogle ScholarCross RefCross Ref
  27. R. Morris and K. Thomson. Password security: A case history. In Communications of the ACM, Vol.22, No.11, pages 594--597, 1979.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. Oechslin. Making a faster cryptanalytic time-memory trade-off. In Proc. CRYPTO '03, volume 2729 of LNCS, pages 617--630. Springer, 2003.]]Google ScholarGoogle Scholar
  29. Openwall Project. John the Ripper password cracker. http://www.openwall.com/john/, 2005.]]Google ScholarGoogle Scholar
  30. Openwall Project. Wordlists collection. http://www.openwall.com/wordlists/, 2005.]]Google ScholarGoogle Scholar
  31. B. Pinkas and T. Sander. Securing passwords against dictionary attacks. In Proc. 9th ACM Conference on Computer and Communications Security (CCS), pages 161--170. ACM, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. L. R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257--286, 1989.]]Google ScholarGoogle ScholarCross RefCross Ref
  33. Zhu Shuanglei. Project RainbowCrack. http://www.antsight.com/zsl/rainbowcrack/, 2005.]]Google ScholarGoogle Scholar
  34. F. Standaert, G. Rouvroy, J.J. Quisquater, and J. Legat. A time/memory tradeoff using distinguished points: new analysis and FPGA results. In Proc. CHES 2002, volume 2523 of LNCS, pages 593--609. Springer, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. S. Stubblebine and P. van Oorschot. Addressing online dictionary attacks with login histories and humans-in-the-loop. In Proc. Financial Cryptography, volume 3110 of LNCS, pages 39--53. Springer, 2004.]]Google ScholarGoogle Scholar
  36. J. Thorpe and P. van Oorschot. Graphical dictionary and the memorable space of graphical passwords. In Proc. 13th USENIX Security Symposium, pages 135--150. USENIX, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Fast dictionary attacks on passwords using time-space tradeoff

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
            November 2005
            422 pages
            ISBN:1595932267
            DOI:10.1145/1102120

            Copyright © 2005 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 November 2005

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,261of6,999submissions,18%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader