2018 IEEE Symposium on Security and Privacy (SP) 2018
DOI: 10.1109/sp.2018.00009
|View full text |Cite
|
Sign up to set email alerts
|

On the Economics of Offline Password Cracking

Abstract: We develop an economic model of an offline password cracker which allows us to make quantitative predictions about the fraction of accounts that a rational password attacker would crack in the event of an authentication server breach. We apply our economic model to analyze recent massive password breaches at Yahoo!, Dropbox, LastPass and AshleyMadison. All four organizations were using key-stretching to protect user passwords. In fact, LastPass' use of PBKDF2-SHA256 with 10 5 hash iterations exceeds 2017 NIST … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
48
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(51 citation statements)
references
References 59 publications
1
48
0
Order By: Relevance
“…The statistics of password generation were studied in [25][26][27][28]. Password frequencies have been shown to follow closely variants of the Zipf's law distribution.…”
Section: Figmentioning
confidence: 99%
See 1 more Smart Citation
“…The statistics of password generation were studied in [25][26][27][28]. Password frequencies have been shown to follow closely variants of the Zipf's law distribution.…”
Section: Figmentioning
confidence: 99%
“…Password frequencies have been shown to follow closely variants of the Zipf's law distribution. In particular, the so-called CDF-Zipf's law model introduced in [25,26] is a modification of the Zipf's law which captures the frequencies of passwords, both for very frequent passwords, and the tails, as exhibited by the close empirical fit to multiple password datasets (see [26,25,27]). Note that an adversary can benefit greatly from the the non-uniformity of these distributions to design more powerful brute-force attacks.…”
Section: Figmentioning
confidence: 99%
“…Recently, Blocki et al [20,29,30] proposed theoretical, economic models to evaluate the economics of offline password cracking for different slow-hash algorithms. However, they did not realize that password reuse could be a major contribution to boost slow-hash recovery.…”
Section: Bcrypt Recoverymentioning
confidence: 99%
“…We also mention several papers which are relevant in the study of password generation and brute-force attacks such as [23][24][25][26]. In [26], a large corpus of password datasets is studied, and several quantities of interest, such as Guesswork, are empirically evaluated.…”
Section: Introductionmentioning
confidence: 99%
“…PDF-Zipf and CDF-Zipf), and validate this model on real-world datasets. The modeling according to a CDF-Zipf's law has also been validated in [25]. We refer to the aforementioned references for more details on the subject.…”
Section: Introductionmentioning
confidence: 99%