Hidden credential retrieval from a reusable password


Autoria(s): Boyen, Xavier
Contribuinte(s)

Li, Wanging

Susilo, Willy

Tupakula, Udaya

Data(s)

2009

Resumo

We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access keys and tokens in a connected world. Although many existing solutions can be employed to protect a long secret using a short password, those solutions typically require certain assumptions on the distribution of the secret and/or the password, and are helpful against only a subset of the possible attackers. After briefly reviewing a variety of approaches, we propose a user-centric comprehensive model to capture the possible threats posed by online and offline attackers, from the outside and the inside, against the security of both the plaintext and the password. We then propose a few very simple protocols, adapted from the Ford-Kaliski server-assisted password generator and the Boldyreva unique blind signature in particular, that provide the best protection against all kinds of threats, for all distributions of secrets. We also quantify the concrete security of our approach in terms of online and offline password guesses made by outsiders and insiders, in the random-oracle model. The main contribution of this paper lies not in the technical novelty of the proposed solution, but in the identification of the problem and its model. Our results have an immediate and practical application for the real world: they show how to implement single-sign-on stateless roaming authentication for the internet, in a ad-hoc user-driven fashion that requires no change to protocols or infrastructure.

Identificador

http://eprints.qut.edu.au/69183/

Publicador

ACM

Relação

DOI:10.1145/1533057.1533089

Boyen, Xavier (2009) Hidden credential retrieval from a reusable password. In Li, Wanging, Susilo, Willy, & Tupakula, Udaya (Eds.) Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ACM, Sydney, NSW, pp. 228-238.

Direitos

Copyright 2009 ACM

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Stateless Roaming Credentials #Reusable Passwords #Online Authentication #Partially Trusted Servers
Tipo

Conference Paper