On the Economics of Offline Password Cracking

06/09/2020
by   Jeremiah Blocki, et al.
0

We develop an economic model of an offline password cracker which allows us to make quantitative predictions about the fraction of accounts that a rational password attacker would crack in the event of an authentication server breach. We apply our economic model to analyze recent massive password breaches at Yahoo!, Dropbox, LastPass and AshleyMadison. All four organizations were using key-stretching to protect user passwords. In fact, LastPass' use of PBKDF2-SHA256 with 10^5 hash iterations exceeds 2017 NIST minimum recommendation by an order of magnitude. Nevertheless, our analysis paints a bleak picture: the adopted key-stretching levels provide insufficient protection for user passwords. In particular, we present strong evidence that most user passwords follow a Zipf's law distribution, and characterize the behavior of a rational attacker when user passwords are selected from a Zipf's law distribution. We show that there is a finite threshold which depends on the Zipf's law parameters that characterizes the behavior of a rational attacker – if the value of a cracked password (normalized by the cost of computing the password hash function) exceeds this threshold then the adversary's optimal strategy is always to continue attacking until each user password has been cracked. In all cases (Yahoo!, Dropbox, LastPass and AshleyMadison) we find that the value of a cracked password almost certainly exceeds this threshold meaning that a rational attacker would crack all passwords that are selected from the Zipf's law distribution (i.e., most user passwords). This prediction holds even if we incorporate an aggressive model of diminishing returns for the attacker (e.g., the total value of 500 million cracked passwords is less than 100 times the total value of 5 million passwords). See paper for full abstract.

READ FULL TEXT
research
01/25/2021

DAHash: Distribution Aware Tuning of Password Hashing Costs

An attacker who breaks into an authentication server and steals all of t...
research
09/21/2020

Information Signaling: A Counter-Intuitive Defense Against Password Cracking

We introduce password strength information signaling as a novel, yet cou...
research
06/26/2022

Cost-Asymmetric Memory Hard Password Hashing

In the past decade, billions of user passwords have been exposed to the ...
research
01/05/2023

Zero-Determinant Strategy in Stochastic Stackelberg Asymmetric Security Game

In a stochastic Stackelberg asymmetric security game, the strong Stackel...
research
01/04/2019

Rational Threshold Cryptosystems

We propose a framework for threshold cryptosystems under a permissionles...
research
07/19/2022

Economics and Optimal Investment Policies of Attackers and Defenders in Cybersecurity

In our time cybersecurity has grown to be a topic of massive proportion ...
research
12/20/2021

Blockchain Mining with Multiple Selfish Miners

This paper studies a fundamental problem regarding the security of block...

Please sign up or login with your details

Forgot password? Click here to reset