skip to main content
10.1145/586110.586133acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Securing passwords against dictionary attacks

Published:18 November 2002Publication History

ABSTRACT

The use of passwords is a major point of vulnerability in computer security, as passwords are often easy to guess by automated programs running dictionary attacks. Passwords remain the most widely used authentication method despite their well-known security weaknesses. User authentication is clearly a practical problem. From the perspective of a service provider this problem needs to be solved within real-world constraints such as the available hardware and software infrastructures. From a user's perspective user-friendliness is a key requirement.In this paper we suggest a novel authentication scheme that preserves the advantages of conventional password authentication, while simultaneously raising the costs of online dictionary attacks by orders of magnitude. The proposed scheme is easy to implement and overcomes some of the difficulties of previously suggested methods of improving the security of user authentication schemes.Our key idea is to efficiently combine traditional password authentication with a challenge that is very easy to answer by human users, but is (almost) infeasible for automated programs attempting to run dictionary attacks. This is done without affecting the usability of the system. The proposed scheme also provides better protection against denial of service attacks against user accounts.

References

  1. Alta Vista, submission of new urls. http://addurl.altavista.com/sites/addurl/newurl]]Google ScholarGoogle Scholar
  2. A. L. Coates, H. S. Baird, and R. J. Fateman, Pessimal Print: A Reverse Turing Test, Proc., ICDAR 2001, pp. 10--12, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M., Proactive Password Checking, 4th Workshop on Computer Security Incident Handling, August 1992.]]Google ScholarGoogle Scholar
  4. N. Bohm, I. Brown, B. Gladman, Electronic Commerce: Who Carries the Risk of Fraud?, 2000 (3) The Journal of Information, Law and Technology. http://elj.warwick.ac.uk/jilt/00-3/bohm.html]]Google ScholarGoogle Scholar
  5. M. K. Boyarsky, Public-Key Cryptography and Password Protocols: The Multi-User Case, 6th ACM Conf. on Comp. and Comm. Security, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. The CAPTCHA Project. http://www.captcha.net/]]Google ScholarGoogle Scholar
  7. The CAPTCHA Project: Gimpy. http://www.captcha.net/gimpy.html]]Google ScholarGoogle Scholar
  8. Hackers find new way to bilk eBay users, CNET news.com, March 25, 2002.]]Google ScholarGoogle Scholar
  9. C. Dwork and M. Naor, Pricing via Processing or Combating Junk Mail, Adv. in Cryptology - CRYPTO '92, Springer-Verlag LNCS 740, pp. 139--147, 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Fu, E. Sit, K. Smith, and N. Feamster, Dos and Don'ts of Client Authentication on the Web, 10th USENIX Security Symp., August 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. O. Goldreich and Y. Lindell, Session-Key Generation using Human Passwords Only, Crypto 2001, Springer-Verlag (LNCS 2139), pages 408--432, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Shai Halevi and Hugo Krawczyk, Public-key cryptography and password protocols, ACM Transactions on Information and System Security, Vol 2, No. 3, Pages 230--268, August 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. I. Jermyn, A. Mayer, F. Monrose, M.K. Reiter and A.D. Rubin. The design and analysis of graphical passwords. 8th USENIX Security Symp., August 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M.D. Lillibridge, M. Abadi, K. Bharat, and A.Z. Broder. Method for selectively restricting access to computer systems. U.S. Patent 6,195,698 (2001).]]Google ScholarGoogle Scholar
  15. D.V. Klein, Foiling the Cracker: A Survey of, and Improvements to, Password Security, 2nd USENIX Unix Security Workshop, 1990, pp.5--14.]]Google ScholarGoogle Scholar
  16. P. MacKenzie, More Efficient Password-Authenticated Key Exchange, Topics in Cryptology -- CT-RSA 2001, pp. 361--377, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. Monrose and A. Rubin. Authentication via keystroke dynamics. In 4th ACM Conference on Computer and Communications Security, April 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. F. Monrose, M. Reiter and S. Wetzel Password hardening based on keystroke dynamics, to appear in the International Journal of Information Security, Springer, 2002.]]Google ScholarGoogle Scholar
  19. R. Morris and K. Thompson, Password Security: A Case History, Communications of the ACM, Vol.22, No.11, November, 1979, pp.594--597.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Naor, Verification of a human in the loop, or Identification via the Turing test, Manuscript (1996). \verb+http://www.wisdom.weizmann.ac.il/naor/PAPERS/+\verb+human_abs.html+]]Google ScholarGoogle Scholar
  21. Paypal, new account reg. http://www.paypal.com.]]Google ScholarGoogle Scholar
  22. J. Xu, R. Lipton, I. Essa, M.-H. Sung, Mandatory human participation: A new scheme for building secure systems, Georgia Institute of Technology Technical Report GIT-CC-01-09, 2001.]]Google ScholarGoogle Scholar
  23. A. Perrig and R, Dhamija, Dj Vu: A User Study Using Images for Authentication, 9th Usenix security Symp., August 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Spafford, E. H., Opus: Preventing Weak Password Choices, Computers & Security, 11 (1992), 273--278.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Workshop on Human Interactive Proofs http://www.parc.xerox.com/istl/groups/did/HIP2002/]]Google ScholarGoogle Scholar
  26. Yahoo!, new account registration.]]Google ScholarGoogle Scholar

Index Terms

  1. Securing passwords against dictionary attacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '02: Proceedings of the 9th ACM conference on Computer and communications security
        November 2002
        284 pages
        ISBN:1581136129
        DOI:10.1145/586110

        Copyright © 2002 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 November 2002

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader