human-computable passwords

20
Human-Computable Passwords Jeremiah Blocki Manuel Blum Anupam Datta Santosh Vempala

Upload: rona

Post on 24-Feb-2016

132 views

Category:

Documents


0 download

DESCRIPTION

Human-Computable Passwords. Jeremiah Blocki Manuel Blum Anupam Datta Santosh Vempala. Previous Work. Naturally Rehearsing Passwords Presentation on Thursday. Password Management. p 1. p 2. p 3. p 4. p 5. Competing Goals:. Password Security Game. p 1. p 2. p 3. p 4. p 5. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Human-Computable Passwords

Human-Computable Passwords

Jeremiah BlockiManuel BlumAnupam Datta

Santosh Vempala

Page 2: Human-Computable Passwords

Previous Work

• Naturally Rehearsing Passwords– Presentation on Thursday

Page 3: Human-Computable Passwords

Password Management

p5

p4

p3

p2

p1

3

Competing Goals:

Security Usability

Page 4: Human-Computable Passwords

Password Security Game

PayPaul.com

+q$1,000,000 guesses

p5

BCRYPT(p4)p5

p4

p3

p2

p1

4

Page 5: Human-Computable Passwords

Security ResultsAttacks k= 1 k= 1

t=1 k=2

Reuse No No No No

Strong Random Independent

Yes Yes Yes Yes

Shared Cues Yes Yes Yes No

5

Usable + Insecure

Unusable + Secure

Usable + Secure

Phishing Attack Offline Attack

Page 6: Human-Computable Passwords

Security ResultsAttacks k= 1 k= 1

t=1 k=2

Reuse No No No No

Strong Random Independent

Yes Yes Yes Yes

Shared Cues Yes Yes Yes No

6

Usable + Insecure

Unusable + Secure

Usable + Secure

Phishing Attack Offline Attack

Page 7: Human-Computable Passwords

Previous Work

• Naturally Rehearsing Passwords– Presentation on Thursday– Password Management Scheme: Shared Cues

• Key Question: Can we get better security if we ask the user to perform simple computations to generate his passwords?

Page 8: Human-Computable Passwords

Human Computation

• Restricted– Simple operations (addition, lookup)– Operations performed in memory (limited space)

9+8=7𝑚𝑜𝑑10 +2348979234 = ?

Page 9: Human-Computable Passwords

Human Computation

• Restricted– Simple operations (addition, lookup)– Operations performed in memory (limited space)

• Improve Security?– Simple Computations vs. Pure Recall– Security against many breaches?

Page 10: Human-Computable Passwords

Candidate Scheme

• Memorize a Random Mapping– One time step!

• Password Computed as a Response to Public Challenges

• Required Operations– Addition modulo 10– Memory lookups

Page 11: Human-Computable Passwords

Random MappingImage I …

σ(I) 9 3 … 6

Initialization: User Memorizes Random Mapping

m images

Page 12: Human-Computable Passwords

Single-Digit Challenge

0

1

2

3

4

5

6

7

8

9

Response:

σ + σ = 2 mod 10

Page 13: Human-Computable Passwords

Single-Digit Challenge

0

1

2

3

4

5

6

7

8

9

Response:

σ + σ = 2 mod 10

Page 14: Human-Computable Passwords

Single-Digit Challenge

0

1

2

3

4

5

6

7

8

9

Response:

σ + σ + σ

= 7 + 4 + 5 = 6 mod 10

Page 15: Human-Computable Passwords

Passwords

0

1

2

3

4

5

6

7

8

9

Password:

Username: jblocki

σ + σ + σ

= 7 + 4 + 5 = 6 mod 10

Page 16: Human-Computable Passwords

Passwords

0

1

2

3

4

5

6

7

8

9

Password: *Username: jblocki

Page 17: Human-Computable Passwords

Passwords

0

1

2

3

4

5

6

7

8

9

Password: **Username: jblocki

Page 18: Human-Computable Passwords

Usability

• Memorization is a one time cost– Mapping f is rehearsed naturally– Can Add new Images over Time

• Time– 75 seconds for a 10 digit password– 7.5 seconds per digit (average)

Page 19: Human-Computable Passwords

Open Challenge

• Random mapping • Examples – 1000 single-digit challenge response pairs

• Can you crack the code and guess one of the challenge passwords?

http://www.cs.cmu.edu/~jblocki/HumanComputablePasswordsChallenge/challenge.htm