Human-Usable Password Schemas: Beyond Information-Theoretic Security

05/31/2019
by   Elan Rosenfeld, et al.
0

Password users frequently employ passwords that are too simple, or they just reuse passwords for multiple websites. A common complaint is that utilizing secure passwords is too difficult. One possible solution to this problem is to use a password schema. Password schemas are deterministic functions which map challenges (typically the website name) to responses (passwords). Previous work has been done on developing and analyzing publishable schemas, but these analyses have been information-theoretic, not complexity-theoretic; they consider an adversary with infinite computing power. We perform an analysis with respect to adversaries having currently achievable computing capabilities, assessing the realistic practical security of such schemas. We prove for several specific schemas that a computer is no worse off than an infinite adversary and that it can successfully extract all information from leaked challenges and their respective responses, known as challenge-response pairs. We also show that any schema that hopes to be secure against adversaries with bounded computation should obscure information in a very specific way, by introducing many possible constraints with each challenge-response pair. These surprising results put the analyses of password schemas on a more solid and practical footing.

READ FULL TEXT
research
08/10/2019

Efficient Three-party Computation: An Information-theoretic Approach from Cut-and-Choose

As far as we know, the literature on secure computation from cut-and-cho...
research
02/14/2019

Potentially Information-theoretic Secure Y00 Quantum Stream Cipher with Limited Key Lengths beyond One-Time Pad

The previous work showed that the Y00 protocol could stay secure with th...
research
08/17/2020

Information-Theoretic Privacy in Federated Submodel learning

We consider information-theoretic privacy in federated submodel learning...
research
09/16/2020

Perfectly Secure Message Transmission against Rational Adversaries

Secure Message Transmission (SMT) is a two-party cryptographic protocol ...
research
09/27/2020

Information Theoretic HotStuff

This work presents Information Theoretic HotStuff (IT-HS), a new optimal...
research
05/28/2019

Adversarially Robust Learning Could Leverage Computational Hardness

Over recent years, devising classification algorithms that are robust to...
research
10/04/2018

Turning Lemons into Peaches using Secure Computation

In many cases, assessing the quality of goods is hard. For example, when...

Please sign up or login with your details

Forgot password? Click here to reset