Secure Passwords Through Enhanced Hashing

نویسندگان

  • Benjamin Strahs
  • Chuan Yue
  • Haining Wang
چکیده

Passwords play a critical role in online authentication. Unfortunately, passwords suffer from two seemingly intractable problems: password cracking and password theft. In this paper, we propose PasswordAgent, a new password hashing mechanism that utilizes both a salt repository and a browser plug-in to secure web logins with strong passwords. Password hashing is a technique that allows users to remember simple low-entropy passwords and have them hashed to create high-entropy secure passwords. PasswordAgent generates strong passwords by enhancing the hash function with a large random salt. With the support of a salt repository, it gains a much stronger security guarantee than existing mechanisms. PasswordAgent is not vulnerable to offline attacks, and it provides stronger protection against password theft. Moreover, PasswordAgent offers usability advantages over existing hash-based mechanisms, while maintaining users’ familiar password entry paradigm. We build a prototype of PasswordAgent and conduct usability experiments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing

Motivated by typo correction in password authentication, we investigate cryptographic error-correction of secrets in settings where the distribution of secrets is a priori (approximately) known. We refer to this as the distribution-sensitive setting. We design a new secure sketch called the layer-hiding hash (LHH) that offers the best security to date. Roughly speaking, we show that LHH saves a...

متن کامل

A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication

Motivated by typo correction in password authentication, we investigate cryptographic error-correction of secrets in settings where the distribution of secrets is a priori (approximately) known. We refer to this as the distribution-sensitive setting. We design a new secure sketch called the layer-hiding hash (LHH) that offers the best security to date. Roughly speaking, we show that LHH saves a...

متن کامل

Cryptanalysis of bcrypt and SHA-512 using Distributed Processing over the Cloud

Passwords are one of the commonly used method to protect one’s personal information against the intruders. But storing passwords as plaintext is not safe, hence they are saved in form of hashes. And authentication occurs by comparing the hash in the database to the hash generated from input taken. It is crucial that the hashing algorithm is not only tough to reverse engineer but, should also be...

متن کامل

Rig: A Simple, Secure and Flexible Design for Password Hashing

Password Hashing, a technique commonly implemented by a server to protect passwords of clients, by performing a one-way transformation on the password, turning it into another string called the hashed password. In this paper, we introduce a secure password hashing framework Rig which is based on secure cryptographic hash functions. It provides the flexibility to choose different functions for d...

متن کامل

User Authentication using Musical Password

Computers, Mobile and other handheld devices depend largely on passwords mechanism to identify and authenticate users. Typically, passwords are strings of characters and digits. Alphanumeric passwords are convoluted to remember for users because a safe password should be long and arbitrary, however users pick short, simple, and insecure passwords. Different solutions have been proposed to aim t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009