On the Security of Cracking-Resistant Password Vaults
Title | On the Security of Cracking-Resistant Password Vaults |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Golla, Maximilian, Beuscher, Benedict, Dürmuth, Markus |
Conference Name | Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security |
Date Published | October 2016 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4139-4 |
Keywords | cracking-resistance, honey encryption, honey pots, Human Behavior, natural language encoders, password managers, pubcrawl, Resiliency, Scalability |
Abstract | Password vaults are used to store login credentials, usually encrypted by a master password, relieving the user from memorizing a large number of complex passwords. To manage accounts on multiple devices, vaults are often stored at an online service, which substantially increases the risk of leaking the (encrypted) vault. To protect the master password against guessing attacks, previous work has introduced cracking-resistant password vaults based on Honey Encryption. If decryption is attempted with a wrong master password, they output plausible-looking decoy vaults, thus seemingly disabling offline guessing attacks. In this work, we propose attacks against cracking-resistant password vaults that are able to distinguish between real and decoy vaults with high accuracy and thus circumvent the offered protection. These attacks are based on differences in the generated distribution of passwords, which are measured using Kullback-Leibler divergence. Our attack is able to rank the correct vault into the 1.3% most likely vaults (on median), compared to 37.8% of the best-reported attack in previous work. (Note that smaller ranks are better, and 50% is achievable by random guessing.) We demonstrate that this attack is, to a certain extent, a fundamental problem with all static Natural Language Encoders (NLE), where the distribution of decoy vaults is fixed. We propose the notion of adaptive NLEs and demonstrate that they substantially limit the effectiveness of such attacks. We give one example of an adaptive NLE based on Markov models and show that the attack is only able to rank the decoy vaults with a median rank of 35.1%. |
URL | http://doi.acm.org/10.1145/2976749.2978416 |
DOI | 10.1145/2976749.2978416 |
Citation Key | golla_security_2016 |