Title: A Convenient Method for Securely Managing Passwords
1A Convenient Method for Securely Managing
Passwords
- J. Alex Halderman
- Princeton
Brent Waters Stanford
Edward W. Felten Princeton
2ing Passwords!
- Web site password overload
- Generating, keeping secret, and recalling
passwords for scores of sites - Leads to insecure coping techniques
- Writing passwords down
- Reusing same passwords
- Difficult to enforce better behavior
- We need to make password security easy
3In This Talk
- Approaches to password management
- Our construction and its security
- Comparison with other techniques
- Demonstration of our implementation
- Future work and conclusions
4Approaches to Password Mgmt
- Local encrypted storage
- e.g., Password Safe (1998)
- Cumbersome to access from multiple locations
- Centralized remote authentication
- e.g., Microsoft Passport (1999)
- Needs server-side changes, trusted third party
- Cryptographic password generation
- e.g., LPWA (1997), PwdHash (2004),
- our scheme (2004)
5Password Generators
- E.g. LPWA, PwdHash
- Client software derives individual site passwords
using deterministic one-way function - Users sets all site passwords to function output
- Only need to remember master password to recreate
all site passwordshighly transportable!
Master Password
amazon.com
Hash()
wrbPzdqS
Use as your Amazon password
A simple idea, but hard to get right!
6Stealing the Master Password
Password Guess
spot
yahoo.com
rover
lassie
spot
fido
Hash()
RWwsYlTi
LZIniBNd
H2VeusSq
CJPZfAKx
amazon.com ? wrbPzdqS gmail.com ?
obIDmogl citibank.com ? sX4rLlO1
?
LZIniBNd
LZIniBNd
Adversary learns password from low-security site
Dictionary attack to learn master password
Can access all otherpassword-managedsites
Easy to execute because scheme use fast hashes
7Thwarting Brute Force Attacks
- attack cost ½ dictionary size cost per
guess - Hard to increase dictionary size
- User habits hard to change, limits on human
memory - Increase cost per guess by using slower hash
- Used elsewhere to protect password verification
routines (UNIX crypt) - Our approach iterated hash
- Security vs. usability tradeoff
- User has to wait too! Cache intermediate
results
8Our Construction
Master password MyD06ReX
User identity jhalderm_at_princeton.edu
Initialization Phase
(k1 gtgt k2)
Hk1()
Local Cache
Target site amazon.com
Hk2()
Master password (again)
Generation Phase
Mapping
Users site passwordfor amazon.com
wrb8zdqS
9Security Analysis
- Four attack scenarios
- No information
- Stolen site password
- Stolen cache data
- Stolen cache site password
- Primary concern is offline attacks.
?
Increasing external difficulty
?
?
?
10Security of Our Scheme
11Relative Attack Resistance
12Equivalent Password Length
13Password Multiplier
- Extension for Mozilla Firefox
- Windows, Mac OS X, and Linux
- Tightly integrated with browser
- Double-click any password field to fill in
- Balanced security and convenience
- Initialization 108 iterations, 100
seconds(Only once per installation) - Password generation 105 iterations, 0.1
secs(Before every password operation)
14Password Multiplier Demo
15Future Improvements
- Flexible password formatting
- Cope with sites that require numbers,
punctuation, special patterns - Easier password changes
- Manually and at regular intervals
- Improved anti-spoofing
- Adopt techniques from PwdHash
- Port to Internet Explorer, others
Require additional state
16Summary Our scheme
- Provides password access from anywhere our
software can be executed - Asks user to remember only one short password
- Requires no server-side changes
- Does not require trusting a third-party service
- Nearly as secure as independent random pwds
- Likely much more secure than what you do now
- Is practical, available today, and free
- http//www.cs.princeton.edu/jhalderm/projects/pas
sword/
17A Convenient Method for Securely Managing
Passwords
- J. Alex Halderman
- Princeton
Brent Waters Stanford
Edward W. Felten Princeton