Usable and Secure Password Management Jeremiah Blocki Spring 2012 Theory Lunch.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Instructional Technology 6260 Cognitive Information Processing Theory.
Where Do All the Attacks Go? Dinei Florencio and Cormac Herley Microsoft Research, Redmond.
Naturally Rehearsing Passwords Jeremiah Blocki ASIACRYPT 2013 Manuel Blum Anupam Datta.
1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton.
Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov Charles Rackoff Comp. Sci. University of Toronto.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords Jeremiah Blocki Saranga Komanduri Lorrie Cranor Anupam Datta NDSS 2015.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Matt Weir, Sudhir Aggarwal, Michael Collins, Henry Stern Presented by Erik Archambault.
Naturally Rehearsing Passwords Jeremiah Blocki NSF TRUST October 2013 Manuel Blum Anupam Datta.
1 Adaptive Witness Encryption and Asymmetric Password-based Cryptography PKC 2015 March 31, 2015 Mihir Bellare UC San Diego Viet Tung Hoang University.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Authentication and access control.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
Mnemonic: Any technique that serves to facilitate storage, encoding, or recall of information in memory. Imagery and mediation (method of loci, peg word.
1 Chapter 1 Introduction. 2 Outline 1.1 A Very Abstract Summary 1.2 History 1.3 Model of the Signaling System 1.4 Information Source 1.5 Encoding a Source.
Homework #4 Comments. Passwords: What are they good for? Today passwords are the #1 means of authenticating users on a day-to-day basis. – , Websites,
Human Computable Passwords
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
DO NOW:  Prepare your operant conditioning projects to turn in.  THEN, answer the following:  What is memory?  How do we create and recall memories?
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Language Learning Strategies Recognizing your strengths and weaknesses, and practicing to improve what you can Adapted from Lessons From Good Language.
1 Authentication and access control overview. 2 Outline Definitions Authentication Factors Evaluation Examples  Focus on password problems and alternatives.
Cognitive Processes That Help Get Information
CIS 450 – Network Security Chapter 8 – Password Security.
MEMORY & INTELLIGENCE.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
+ How Memory Works? By Grace Fleming, Homework and Study Tips Expert Kendra Cherry, Psychology Expert.
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
Multi Store Model Calvin Laverick. Why have a model? A model is useful so we can test and investigate how memory works. – Without one, this would be very.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
INTERNET SAFETY FOR KIDS
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Storage Processes Go to this web site to review six cognitive processes that affect long term memory storage and see a power point.
Memory: Information Processing. Information Processing Model 1. Encoding - getting information into the memory system 2. Storage - retaining the information.
Passwords and Password Policies An Important Part of IT Control – by Craig Piercy.
MEMORY & INTELLIGENCE. MEMORY: The input, storage, and retrieval of what has been learned or experienced.
Dyslexia Thursday 21 st November 2013 Laura Bradbury and Donna Lloyd.
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
Education is what remains after one has forgotten what one has learned in school. Albert Einstein.
Human-Computable Passwords Jeremiah Blocki Manuel Blum Anupam Datta Santosh Vempala.
Defending Your Memory. Copyright © Houghton Mifflin Company. All rights reserved. 4–24–2 What is the biggest impediment to academic success? Forgetting.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Chapter 7 Memory. Objectives 7.1 Overview: What Is Memory? Explain how human memory differs from an objective video recording of events. 7.2 Constructing.
Do you agree or disagree with this statement? “Memory is what makes our lives… Without it, we are nothing”.
Cognition Domain kali9/istockphoto. Memory Rodrigo Blanco/istockphoto.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Towards Human Computable Passwords
Authentication Schemes for Session Passwords using Color and Images
Password Management Limit login attempts Encrypt your passwords
Levels of Processing Memory Model (LoP)
Human Memory Keywords:
Get into groups of 4 & spread out!
Usable and Secure Human Authentication
Human Computable Passwords
Human-Computable Passwords
Jeremiah Blocki Saranga Komanduri Lorrie Cranor Anupam Datta
Introduction to Computers
Short-term Memory Notes (based on photocopies from class on Sept. 14)
What tricks do you use to remember new information?
Presentation transcript:

Usable and Secure Password Management Jeremiah Blocki Spring 2012 Theory Lunch

Password Management Competing Goals: SecurityUsability 2

A Challenging Problem 3  Traditional Security Advice Not too short Use mix of lower/upper case letters Change your passwords every 90 days Use numbers and letters Don’t use words/names Use special symbols Don’t Write it Down Don’t Reuse Passwords

Reevaluate Traditional Advice? 4 Source: [Munroe] XKCD

Experiment #0 5  Memorize a random 10 character password  Case Sensitive! L[IbCGa_ND

Experiment #1 Chaplin, Newspapers (plural) Cedric, Scanner 6

Experiment #2 March (“Marching” – “ing”) Boats, Brie Swim ( not Michael Phelps ) 7

Experiment #2 Kareem, Plunge (“Plunger” – “r”) Seal, Beneath 8

Experiment #3 9 CueActionObject Manuel Blumtorturinglion

Experiment #4 10 CueActionObject Stephen Rudichdestroyingshark

Experiment #3 Darth, Frosty Frosty, SoxDarth, Hover (“Hovercraft” – “craft”) 11

Experiment #4 March (“Marching” – “ing”) Boats, Brie Swim ( not Michael Phelps ) 12

Outline 13  Introduction and Experiments  Memory and Usability  Four Big Factors  Analyzing Security  Our Password Management Scheme

Factor 1: Chunking  Memorize: nbccbsabc  Memorize: tkqizrlwp  3 Chunks vs. 9 Chunks!  Usability Goal: Minimize Number of Chunks in Password Source: The magical number seven, plus or minus two [Miller, 56] 14

Chunking 15 Source: [Munroe]

Human Memory is Associative ? 16

Factor 2: Cue Strength 17  Cue: context when a memory is stored  Surrounding Environment  Sounds  Visual Surroundings  Web Site  ….  As time passes we forget some of this context…

Mathematical Model (Cues) 18 i  {music, desk, password, amazon,…}

Mathematical Model (Associative Memory) 19 Add the cue-association pair to memory (M) Find the memory associated with the given cue in M

Retrieval from Partial Cue 20 Original Cue Retrieval Cue Cue Strength

Retrieval from Partial Cue 21

Retrieval from Partial Cue 22 Probability of Recall Source: Simple memory: a theory for archicortex [Marr] Partial Cue Fraction

Factor 3: Interference Cue jblocki, l3tm3in jblocki, unbr3akabl3 jblocki, Tr0ub4dor&3 jblocki, horsebatterystaplecorrect … 23

Interference (Example) 24 Impossible to identify which memory is associated with the cue! If the contexts are only “slightly different” there will still be significant interference!

Forgetting 25  What fraction of the original cue is present when the user retrieves the password?  Can we ensure that we always have a significant fraction of the original cue?  Too many chunks associated with one cue?  Interference!

Factor 4: Rehearsal 26 Strengthens Associations Goal: minimize the number of rehearsals necessary to remember passwords Password may be linked to different contexts (cues)

Rehearsal 27  It helps if part of the context is consistent across all rehearsals/retrieval

Usability Desiderata 28  Minimize #chunks per password  Ensure that a large part of the original cue is always available at retrieval time  Minimize Interference  Minimize the required number of rehearsals

How Do People Pick Passwords? Source: Science of Password Selection (Hunt, 2011)Science of Password Selection 29

Password Management Competing Goals: SecurityUsability 30

Competing Goals  Usability – “easy” for user to create and remember his passwords  Security – “hard” for adversary to learn passwords.  After many guesses  Even after seeing other passwords SecurityUsability 31

Outline 32  Introduction and Experiments  Memory and Usability  Analyzing Security  Our Password Management Scheme

Security (what could go wrong?) OnlineOfflinePhishing Danger Three Types of Attacks 33

Online Attack Limit Guesses: Three Strike Policy

Offline Dictionary Attack Source: CERT Incident Note IN-98.03: Password Cracking Activity MD5(“UnBr3akabl3”) + “UnBr3akabl3” 35

Malicious Sites/Phishing Source: CERT Incident Note IN-98.03: Password Cracking Activity PayPaul.com + 36 pwd

Measuring Security 37  Past Measurements and Their Weaknesses  Password Strength Meters  Entropy  Min Entropy  Our Definition of Security

Password Strength Meters mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm Impossible to know what background knowledge the adversary will have! 38 Source: Our Approach: Measure the security of the password generator instead

Password Generator (G) 39

Entropy Source: The mathematical theory of communication (Shannon, 1959) Intuition: 30 bits of entropy => Average # Guesses ~ # Bits to encode password x Average # Bits to encode password x

Entropy  Example: 41

Entropy (Strengths) Source: Prediction and entropy of printed English (Shannon, 1951) There are techniques for estimating the entropy of an individual password 42

Entropy (Weaknesses) Both password generators have same entropy! One guess breaks scheme one half of the time! 43

Entropy (Weaknesses) mmmm G 1 has high entropy, but is insecure! 44

Entropy (Weaknesses)  High Entropy Does Not Guarantee Safety! OnlineOfflinePhishing 45

Min-Entropy 46 # Bits to encode most likely password x # Bits to encode password x

Min Entropy (Strengths) + “horsebatterystaplecorrect” MD5(pwd) 47

Min Entropy (Strengths)  High Minimum Entropy OnlineOfflinePhishing 48

Min-Entropy (Weaknesses) Unlike regular entropy, Min- Entropy is hard to estimate 49

Min-Entropy (Weaknesses) H min (G 1 ) = 2n = H min (G 2 ) Min-Entropy ignores correlations between passwords 50

Min-Entropy (Weaknesses) PayPaul.com x x x 51

Our Security Approach 52  Dangerous World Assumption  Not enough to defend against existing adversaries  Adversary can adapt after learning the user’s new password management strategy  Provide guarantees even when things go wrong  Offline attacks should fail with high probability  Limit damage of a successful phishing attack

The Adversary’s Game  Adversary can compromise at most k sites (phishing).  Adversary can execute offline attacks against at most t additional sites  Resource Constraints => at most M guesses  Adversary wins if he can compromise any new sites. 53 pwd MD5(pwd)

(k,t,M,  )-Security We say that a password management scheme is (k,t,M,  )-Secure if for any adversary Adv k = #t = # 54 Offline AttacksPhishing Attacks M = # Guesses

Example: (1,1,M,  )-Security PayPaul.com + M guesses k=1 t=1 55

Outline 56  Introduction and Experiments  Memory and Usability  Analyzing Security  Our Password Management Scheme

Review Usability Desiderata 57  Minimize #chunks per password  Ensure that a large part of the original cue is always available at retrieval time  Minimize Interference What mnemonic techniques do the memory experts use?

Memory Palace 58 Memory champions like Dominic O'Brien regularly use memory palaces

Memory Palace  Idea: Humans have excellent visual/spatial memory  Memorize a list of words  Memorize: Mentally walk through your house and “store” one word in each location  Recall: Mentally walk past each location to recover each word  Key Point: By associating each word with a familiar location we can always recover part of the original cue Source: Rhetorica ad Herennium [Cicero?] 59

Memory Palace Interference?  Don’t reuse the same memory palace very often!  Memory Champions have hundreds of memory palaces!  Spend time mentally “clearing” each palace before a competition  Usability: A typical user doesn’t have time to prepare hundreds of memory palaces! Source: Moonwalking with Einstein [Foer, 2010] 60

Our Approach  Idea: Use pictures as cues instead  Don’t have to remember the cue! Store it externally! Liquor, Wounded, Sunk 61

Secure Password Management Scheme 62 Public KnowledgePrivate (Password) Amazon eBay …… Random Words (Independently Selected) Random Words (Independently Selected) ……

Usability 63  Four chunks per password  Independent Cues  Reduces Interference  Partial Cue (picture) is stored externally and is always available

Security 64  Password Strength  Strong Password: 4 random words from common dictionary  Stronger than a truly random ten character password  Password Independence  Independent of Cues  Independent of Other Passwords  (t,k,M,  )-security for large t,k!

Experiment #0 65  Can anybody remember the 10 character password? L[IbCGa_ND

Experiment #1 66

Experiment #2 67

Experiment #2 68

Experiment #3 69 CueActionObject Manuel Blum

Experiment #4 70 CueActionObject Stephen Rudich

Experiment #3 71

Personal Experience  I have created 25+ unique (strong) passwords using this technique  Tricks to overcome common restrictions  Substitute 3 for e, etc…  Use first 4 letters of each word  Difficulties  Word Order  Confuse verb tense  Plural vs. Singular  Semantically Similar Words 72

Future Work 73  Can we quantify and measure the usability of a password management scheme?  Share cues across sites (security/usability tradeoff)  Accepting close passwords  User Studies

Usability  More challenging to quantify than security!  Key Question: Given a password management scheme how much effort does it take to create, store and retrieve passwords from human memory?  This Talk:  Key factors that influence memorability  Helpful mnemonic techniques 74

Questions? 75