Skip to main content

2017 | OriginalPaper | Buchkapitel

Decoy Password Vaults: At Least as Hard as Steganography?

verfasst von : Cecilia Pasquini, Pascal Schöttle, Rainer Böhme

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cracking-resistant password vaults have been recently proposed with the goal of thwarting offline attacks. This requires the generation of synthetic password vaults that are statistically indistinguishable from real ones. In this work, we establish a conceptual link between this problem and steganography, where the stego objects must be undetectable among cover objects. We compare the two frameworks and highlight parallels and differences. Moreover, we transfer results obtained in the steganography literature into the context of decoy generation. Our results include the infeasibility of perfectly secure decoy vaults and the conjecture that secure decoy vaults are at least as hard to construct as secure steganography.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
In case of password addition or updating, \(\mathbf {x}_{\text {real}}\) is modified and encoded to a new string \(\mathbf {s}_{\text {real}}\), which is then encrypted under mpw\(_{\text {real}}\) to obtain a new ciphertext.
 
2
It is to be noted that the authors estimate the cmpfs from datasets of single passwords instead of entire vaults.
 
Literatur
2.
Zurück zum Zitat Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: loss-resistant password management. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 286–302. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15497-3_18 CrossRef Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: loss-resistant password management. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 286–302. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-15497-3_​18 CrossRef
3.
Zurück zum Zitat Bonneau, J.: Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge, May 2012 Bonneau, J.: Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge, May 2012
5.
Zurück zum Zitat Chatterjee, R., Bonneau, J., Juels, A., Ristenpart, T.: Cracking-resistant password vaults using natural language encoders. In: IEEE Security and Privacy, pp. 481–498 (2016) Chatterjee, R., Bonneau, J., Juels, A., Ristenpart, T.: Cracking-resistant password vaults using natural language encoders. In: IEEE Security and Privacy, pp. 481–498 (2016)
6.
Zurück zum Zitat Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)CrossRef Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)CrossRef
7.
Zurück zum Zitat Florencio, D., Herley, C.: A large-scale study of web password habits. In: ACM International Conference on World Wide Web, pp. 656–666 (2007) Florencio, D., Herley, C.: A large-scale study of web password habits. In: ACM International Conference on World Wide Web, pp. 656–666 (2007)
8.
Zurück zum Zitat Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004). doi:10.1007/978-3-540-30114-1_6 CrossRef Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-30114-1_​6 CrossRef
9.
Zurück zum Zitat Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)CrossRefMATH Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)CrossRefMATH
10.
Zurück zum Zitat Golla, M., Beuscher, B., Dürmuth, M.: On the security of cracking-resistant password vaults. In: ACM Conference on Computer and Communications Security, pp. 1230–1241 (2016) Golla, M., Beuscher, B., Dürmuth, M.: On the security of cracking-resistant password vaults. In: ACM Conference on Computer and Communications Security, pp. 1230–1241 (2016)
11.
Zurück zum Zitat Juels, A., Ristenpart, T.: Honey encryption: beyond the brute-force barriers. In: Advances in Cryptology - EUROCRYPT, pp. 293–310 (2014) Juels, A., Ristenpart, T.: Honey encryption: beyond the brute-force barriers. In: Advances in Cryptology - EUROCRYPT, pp. 293–310 (2014)
12.
Zurück zum Zitat Kaliski, B.: PKCS# 5: Password-based cryptography specification version 2.0. RFC 2289 (2000) Kaliski, B.: PKCS# 5: Password-based cryptography specification version 2.0. RFC 2289 (2000)
13.
Zurück zum Zitat Li, Z., He, W., Akhawe, D., Song, D.: The emperor’s new password manager: security analysis of web-based password managers. In: USENIX Security Symposium, pp. 465–479 (2014) Li, Z., He, W., Akhawe, D., Song, D.: The emperor’s new password manager: security analysis of web-based password managers. In: USENIX Security Symposium, pp. 465–479 (2014)
14.
Zurück zum Zitat Maurer, U.M.: A unified and generalized treatment of authentication theory. In: Puech, C., Reischuk, R. (eds.) STACS 1996. LNCS, vol. 1046, pp. 387–398. Springer, Heidelberg (1996). doi:10.1007/3-540-60922-9_32 Maurer, U.M.: A unified and generalized treatment of authentication theory. In: Puech, C., Reischuk, R. (eds.) STACS 1996. LNCS, vol. 1046, pp. 387–398. Springer, Heidelberg (1996). doi:10.​1007/​3-540-60922-9_​32
16.
Zurück zum Zitat Silver, D., Jana, S., Boneh, D., Chen, E.: Password managers: attacks and defenses. In: USENIX Security Symposium, pp. 449–464 (2014) Silver, D., Jana, S., Boneh, D., Chen, E.: Password managers: attacks and defenses. In: USENIX Security Symposium, pp. 449–464 (2014)
Metadaten
Titel
Decoy Password Vaults: At Least as Hard as Steganography?
verfasst von
Cecilia Pasquini
Pascal Schöttle
Rainer Böhme
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-58469-0_24

Premium Partner