Visible to the public Do you think your passwords are secure?

TitleDo you think your passwords are secure?
Publication TypeConference Paper
Year of Publication2014
AuthorsZiegler, D., Rauter, M., Stromberger, C., Teufl, P., Hein, D.
Conference NamePrivacy and Security in Mobile Systems (PRISMS), 2014 International Conference on
Date PublishedMay
KeywordsAndroid password-manager, Androids, authentication, authorisation, bruteforce attack, cryptographic key, cryptography, Databases, direct decryption, Encryption, Humanoid robots, key derivation function, message authentication, mobile device, password security, security-critical application, ubiquitous access, ubiquitous computing, usability
Abstract

Many systems rely on passwords for authentication. Due to numerous accounts for different services, users have to choose and remember a significant number of passwords. Password-Manager applications address this issue by storing the user's passwords. They are especially useful on mobile devices, because of the ubiquitous access to the account passwords. Password-Managers often use key derivation functions to convert a master password into a cryptographic key suitable for encrypting the list of passwords, thus protecting the passwords against unauthorized, off-line access. Therefore, design and implementation flaws in the key derivation function impact password security significantly. Design and implementation problems in the key derivation function can render the encryption on the password list useless, by for example allowing efficient bruteforce attacks, or - even worse - direct decryption of the stored passwords. In this paper, we analyze the key derivation functions of popular Android Password-Managers with often startling results. With this analysis, we want to raise the awareness of developers of security critical apps for security, and provide an overview about the current state of implementation security of security-critical applications.

DOI10.1109/PRISMS.2014.6970600
Citation Key6970600