1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Operating Systems Manage system resources –CPU scheduling –Process management –Memory management –Input/Output device management –Storage device management.
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Stronger Password Authentication Using Browser Extensions Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John Mitchell Stanford University
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Web Browser Privacy and Security Part I. Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Server issues How to approach the design of servers.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
Windows 2003 and 802.1x Secure Wireless Deployments.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
CIS 450 – Network Security Chapter 8 – Password Security.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley.
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
G53SEC 1 Authentication and Identification Who? What? Where?
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Single Sign-On across Web Services Ernest Artiaga CERN - OpenLab Security Workshop – April 2004.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
G53SEC 1 Authentication and Identification Who? What? Where?
Kerberos Guilin Wang School of Computer Science 03 Dec
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Knock Yourself Out Secure Authentication with Short Re-Usable Passwords by Benjamin Guldenring, Volker Roth and Lars Ries PRESENTED BY EUNYOUNG CHO COLLEGE.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Stanford University Ari Juels, RSA Laboratories Alex Halderman, Princeton University.
Wireless and Mobile Security
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Greystash February Program Review. Team Failing Street Kyle DeFrancia – Spring Lead Erik Paulson – Fall Lead Joe Devlin - Webmaster.
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
IT Security Awareness Day October 19, 2016
Hardware-rooted Trust for Secure Key Management & Transient Trust
Cryptographic Hash Function
Written by : Thomas Ristenpart, Eran Tromer, Hovav Shacham,
Cryptographic Hash Functions Part I
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Kiran Subramanyam Password Cracking 1.
Security.
Cryptographic Hash Functions Part I
Operating System Concepts
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton

2 J. Alex Halderman Web site password overload Generating, keeping secret, and recalling passwords for scores of sites Leads to insecure coping techniques – Writing passwords down – Reusing same passwords Difficult to enforce better behavior We need to make password security easy ****ing Passwords!

3 J. Alex Halderman In This Talk 1.Approaches to password management 2.Our construction and its security 3.Comparison with other techniques 4.Demonstration of our implementation 5.Future work and conclusions

4 J. Alex Halderman Approaches to Password Mgmt Local encrypted storage e.g., Password Safe (1998) –Cumbersome to access from multiple locations Centralized remote authentication e.g., Microsoft Passport (1999) –Needs server-side changes, trusted third party Cryptographic password generation e.g., LPWA (1997), PwdHash (2004), our scheme (2004)

5 J. Alex Halderman Password Generators Master Password“amazon.com” Hash() “wrbPzdqS” Use as your Amazon password A simple idea, but hard to get right! E.g.: LPWA, PwdHash Client software derives individual site passwords using deterministic one-way function Users sets all site passwords to function output Only need to remember master password to recreate all site passwords—highly transportable!

6 J. Alex Halderman == Stealing the Master Password Adversary learns password from low-security site Password Guess “yahoo.com” Hash () “RWwsYlTi” “LZIniBNd” =? Dictionary attack to learn master password Can access all other password-managed sites “rover”“lassie”“spot”“fido” “LZIniBNd”“H2VeusSq”“CJPZfAKx” amazon.com  wrbPzdqS gmail.com  obIDmogl citibank.com  sX4rLlO1 “spot” Easy to execute because scheme use fast hashes

7 J. Alex Halderman Thwarting Brute Force Attacks attack cost = ½ × dictionary size × cost per guess Hard to increase dictionary size User habits hard to change, limits on human memory Increase cost per guess by using slower hash –Used elsewhere to protect password verification routines (UNIX crypt) –Our approach: iterated hash Security vs. usability tradeoff User has to wait too! — Cache intermediate results

8 J. Alex Halderman Our Construction Master password “MyD06ReX” User identity H k 1 () “wrb8zdqS” User’s site password for “amazon.com” H k 2 () Target site “amazon.com” Local Cache (k 1 >> k 2 ) Initialization Phase Generation Phase Mapping Master password (again)

9 J. Alex Halderman Security Analysis Four attack scenarios: 1.No information 2.Stolen site password 3.Stolen cache data 4.Stolen cache + site password Primary concern is offline attacks. ? ? ? Increasing external difficulty

10 J. Alex Halderman Security of Our Scheme Attack scenario Hashes/ guess Time/ guess 1. No informationN/A 2. Stolen site passwordk1+k2k1+k s 3. Stolen cache datak1k1 100s 4. Stolen cache + site passwordk2k2 0.1s

11 J. Alex Halderman Relative Attack Resistance Estimated time to test 100,000 guesses Scheme Stolen password Stolen data Stolen pw and data Password SafeN/A74.6 secs LPWA0.5 secsN/A PwdHash0.1 secsN/A Our Scheme116 days 2.8 hours

12 J. Alex Halderman Equivalent Password Length **** ******** *********

13 J. Alex Halderman Password Multiplier Extension for Mozilla Firefox Windows, Mac OS X, and Linux Tightly integrated with browser Double-click any password field to fill in Balanced security and convenience –Initialization — 10 8 iterations, ~100 seconds (Only once per installation) –Password generation — 10 5 iterations, ~0.1 secs (Before every password operation)

14 J. Alex Halderman Password Multiplier — Demo

15 J. Alex Halderman Future Improvements Flexible password formatting Cope with sites that require numbers, punctuation, special patterns Easier password changes Manually and at regular intervals Improved anti-spoofing Adopt techniques from PwdHash Port to Internet Explorer, others Require additional “state”

16 J. Alex Halderman Summary — Our scheme: Provides password access from anywhere our software can be executed Asks user to remember only one short password Requires no server-side changes Does not require trusting a third-party service Nearly as secure as independent random pwds Likely much more secure than what you do now Is practical, available today, and free

17 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton