skip to main content
10.1145/1866307.1866327acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Testing metrics for password creation policies by attacking large sets of revealed passwords

Published:04 October 2010Publication History

ABSTRACT

In this paper we attempt to determine the effectiveness of using entropy, as defined in NIST SP800-63, as a measurement of the security provided by various password creation policies. This is accomplished by modeling the success rate of current password cracking techniques against real user passwords. These data sets were collected from several different websites, the largest one containing over 32 million passwords. This focus on actual attack methodologies and real user passwords quite possibly makes this one of the largest studies on password security to date. In addition we examine what these results mean for standard password creation policies, such as minimum password length, and character set requirements.

References

  1. }}W. Burr, D. Dodson, R. Perlner, W. Polk, S. Gupta, E. Nabbus, "NIST Special Publication 800--63--1 Electronic Authentication Guideline", Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, April, 2006Google ScholarGoogle Scholar
  2. }}Office of Management and Budget, "Draft Agency Implementation, Guidance for Homeland Security, Presidential Directive 12", August 2004.Google ScholarGoogle Scholar
  3. }}P. Bowen, A. Johnson, J. Hash, C. Dancy Smith, D. Steinberg, "NIST Special Publication 800--66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule", Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD.Google ScholarGoogle Scholar
  4. }}C.E. Shannon, "A Mathematical Theory of Communication", Bell System Technical Journal, vol. 27, pp. 379--423, 623--656, July, October, 1948.Google ScholarGoogle ScholarCross RefCross Ref
  5. }}C. Herley, "So Long and No Thanks for the Externalities: The Rationl Rejection of Security Advice by Users." NSPW 09, September 8--11 2009 Oxford, United Kingdom. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}A. Vance, "If Your Password is 123456 Just Make it HackMe" New York Times, January 20th, 2010. Page A1.Google ScholarGoogle Scholar
  7. }}E. R. Verheul. "Selecting secure passwords", CT-RSA 2007, Proceedings Volume 4377 of Lecture Notes in Computer Science, pages 49--66. Springer Verlag, Berlin, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}J.L. Massey, "Guessing and Entropy," Proc. 1994 IEEE International Symposium on Information Theory, 1995, p.329.Google ScholarGoogle Scholar
  9. }}The OpenWall Group, {Software} John the Ripper password cracker, {Online Document} {cited 2--19--2010} Available HTTP http://www.openwall.comGoogle ScholarGoogle Scholar
  10. }}A list of popular password cracking wordlists, 2005, {Online Document} {cited 2010 January 14} Available HTTP http://www.outpost9.com/files/WordLists.htmlGoogle ScholarGoogle Scholar
  11. }}M. Weir and S. Aggarwal. "Cracking 400,000 Passwords or How to Explain to Your Roommate why the Power-Bill is a Little High", Defcon 17, Las Vegas, NV, August 2009Google ScholarGoogle Scholar
  12. }}J. Leversund "The Password Meta Policy" {Online Document} {cited 2010 April 16} Available HTTP http://securitynirvana.blogspot.com/2010/02/password-meta-policy.htmlGoogle ScholarGoogle Scholar
  13. }}G. Bard, "Spelling-Error Tolerant, Order Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric" Fifth Australasian Symposium on ACSW Frontiers - Volume 68 (Ballarat, Australia, January 30 - February 02, 2007), 117--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}A. Forget, S. Chiasson, P.C. van Oorschot, R. Biddle, "Improving Text Passwords through Persuasion." Symposium on Usable Privacy and Security (SOUPS) 2008, July 23--25, 2008, Pittsburgh, PA USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}B. Schneier, "Write Down Your Password", June 17, 2005 {Online Document} {cited 2010 April 16} Available HTTP http://www.schneier.com/blog/archives/2005/06/write_down_your.htmlGoogle ScholarGoogle Scholar
  16. }}Various Authors, "Faithwriters.com hacked message posts" {Online Document} {cited 2010 April 16} Available HTTP http://forums.crosswalk.com/m_4252083/mpage_1/tm.htmGoogle ScholarGoogle Scholar
  17. }}B. Ryan, "The Hacking of the http://db.singles.org" {Online Document} {cited 2010 April 16} Available HTTP http://msmvps.com/blogs/williamryan/archive/2009/02/22/the-hacking-of-http-db-singles-org.aspxGoogle ScholarGoogle Scholar
  18. }}M. Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek, "Password Cracking Using Probabilistic Context Free Grammars," Proceedings of the 30th IEEE Symposium on Security and Privacy, May 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}R. Morris and K. Thompson. "Password security: a case history" Communications. ACM, 22(11):594--597, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. }}A. Narayanan and V. Shmatikov, Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff, CCS'05, November 7--11, 2005, Alexandria, Virginia Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. }}J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password Memorability and Security: Empirical Results. IEEE Security and Privacy Magazine, Volume 2, Number 5, pages 25--31, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. }}T. Wu, "A real-world analysis of kerberos password security," in 1999 Network and Distributed System Security Symposium, February 1999.Google ScholarGoogle Scholar
  23. }}B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," Tech. Rep., April 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. }}Sophos, "Security at risk as one third of surfers admit they use the same password for all websites", {Online Document} {cited 2010 July 14} Available HTTP http://www.sophos.com/pressoffice/news/articles/2009/03/password-security.htmlGoogle ScholarGoogle Scholar
  25. }}L. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor, P. McDaniel and T. Jaeger, "Password Exhaustion: Predicting the End of Password Usefulness" ICISS, volume 4332 of Lecture Notes in Computer Science, pages 37--55, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. }}J. Bonneau, S. Preibusch, "The Password Thicket: Technical and Market Failures in Human Authentication on the Web", The Ninth Workshop on the Economics of Information Security, WEIS 2010.Google ScholarGoogle Scholar
  27. }}K. Zetter, "Weak Password Brings 'Happiness' to Twitter Hacker" {Online Document} {cited 10'0 July 19} Available HTTP http://www.wired.com/threatlevel/2009/01/professed-twitt/Google ScholarGoogle Scholar

Index Terms

  1. Testing metrics for password creation policies by attacking large sets of revealed passwords

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
        October 2010
        782 pages
        ISBN:9781450302456
        DOI:10.1145/1866307

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 October 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '10 Paper Acceptance Rate55of325submissions,17%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader