Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext

06/14/2023
by   Norbert Tihanyi, et al.
0

Using the computational resources of an untrusted third party to crack a password hash can pose a high number of privacy and security risks. The act of revealing the hash digest could in itself negatively impact both the data subject who created the password, and the data controller who stores the hash digest. This paper solves this currently open problem by presenting a Privacy-Preserving Password Cracking protocol (3PC), that prevents the third party cracking server from learning any useful information about the hash digest, or the recovered cleartext. This is achieved by a tailored anonymity set of decoy hashes, based on the concept of predicate encryption, where we extend the definition of a predicate function, to evaluate the output of a one way hash function. The protocol allows the client to maintain plausible deniability where the real choice of hash digest cannot be proved, even by the client itself. The probabilistic information the server obtains during the cracking process can be calculated and minimized to a desired level. While in theory cracking a larger set of hashes would decrease computational speed, the 3PC protocol provides constant-time lookup on an arbitrary list size, bounded by the input/output operation per second (IOPS) capabilities of the third party server, thereby allowing the protocol to scale efficiently. We demonstrate these claims both theoretically and in practice, with a real-life use case implemented on an FPGA architecture.

READ FULL TEXT

page 1

page 10

page 11

research
12/13/2021

Comments on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server"

Recently, Xie et al. (IEEE Transactions on Information Forensics and Sec...
research
06/22/2022

Multi-party Secure Broad Learning System for Privacy Preserving

Multi-party learning is an indispensable technique for improving the lea...
research
08/02/2023

Delegated Time-Lock Puzzle

Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a clien...
research
03/27/2022

Privacy-preserving record linkage using local sensitive hash and private set intersection

The amount of data stored in data repositories increases every year. Thi...
research
12/17/2021

Privacy preserving n-party scalar product protocol

Privacy-preserving machine learning enables the training of models on de...
research
09/04/2020

Homomorphic-Encrypted Volume Rendering

Computationally demanding tasks are typically calculated in dedicated da...
research
12/17/2018

Privacy-Preserving Distributed Joint Probability Modeling for Spatial-Correlated Wind Farms

Building the joint probability distribution (JPD) of multiple spatial-co...

Please sign up or login with your details

Forgot password? Click here to reset