Skip to main content

2019 | OriginalPaper | Buchkapitel

A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack

verfasst von : Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vazquez Sandoval

Erschienen in: Information Systems Security and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Password-based authentication is a widespread method to access into systems, thus password files are a valuable resource often target of attacks. To detect when a password file has been stolen, Juels and Rivest introduced the Honeywords System in 2013. The core idea is to store the password with a list of decoy words that are “indistinguishable” from the password, called honeywords. An adversary that obtains the password file and, by dictionary attack, retrieves the honeywords can only guess the password when attempting to log in: but any incorrect guess will set off an alarm, warning that file has been compromised. In a recent conference paper, we studied the security of the Honeywords System in a scenario where the intruder also manages to corrupt the server’s code (with certain limiting assumptions); we proposed an authentication protocol and proved it secure despite the corruption. In this extended journal version, we detail the analysis and we extend it, under the same attacker model, to the other two protocols of the original Honeywords System, the setup and change of password. We formally verify the security of both of them; further, we discuss that our design suggests a completely new approach that diverges from the original idea of the Honeywords System but indicates an alternative way to authenticate users which is robust to server’s code-corruption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
This is what R. Gonggrijp did when, in 2006, proved insecure a Dutch electronic voting machine.
 
2
Source code is available under GPLv3 at https://​github.​com/​codeCorruption/​HoneywordsM.
 
Literatur
1.
Zurück zum Zitat Furnell, S.M., Dowland, P., Illingworth, H., Reynolds, P.L.: Authentication and supervision: a survey of user attitudes. Comput. Secur. 19, 529–539 (2000)CrossRef Furnell, S.M., Dowland, P., Illingworth, H., Reynolds, P.L.: Authentication and supervision: a survey of user attitudes. Comput. Secur. 19, 529–539 (2000)CrossRef
5.
Zurück zum Zitat Juels, A., Rivest, R.L.: Honeywords: Making password-cracking detectable. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 145–160. ACM (2013) Juels, A., Rivest, R.L.: Honeywords: Making password-cracking detectable. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 145–160. ACM (2013)
6.
Zurück zum Zitat Erguler, I.: Achieving flatness: selecting the honeywords from existing user passwords. IEEE Trans. Dependable Secure Comput. 13(2), 284–295 (2016)CrossRef Erguler, I.: Achieving flatness: selecting the honeywords from existing user passwords. IEEE Trans. Dependable Secure Comput. 13(2), 284–295 (2016)CrossRef
7.
Zurück zum Zitat Genc, Z.A., Lenzini, G., Ryan, P.Y.A., Vazquez-Sandoval, I.: A security analysis, and a fix, of a code-corrupted honeywords system. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018) Genc, Z.A., Lenzini, G., Ryan, P.Y.A., Vazquez-Sandoval, I.: A security analysis, and a fix, of a code-corrupted honeywords system. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)
8.
Zurück zum Zitat Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Syst. J. 40, 666–682 (2001)CrossRef Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Syst. J. 40, 666–682 (2001)CrossRef
9.
Zurück zum Zitat NIST: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions (2015) NIST: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions (2015)
10.
Zurück zum Zitat Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: 14th IEEE Computer Security Foundations Workshop, pp. 82–96. IEEE (2001) Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: 14th IEEE Computer Security Foundations Workshop, pp. 82–96. IEEE (2001)
Metadaten
Titel
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack
verfasst von
Ziya Alper Genç
Gabriele Lenzini
Peter Y. A. Ryan
Itzel Vazquez Sandoval
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-25109-3_7