Naturally Rehearsing Passwords Jeremiah Blocki NSF TRUST October 2013 Manuel Blum Anupam Datta.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Password Cracking Lesson 10. Why crack passwords?
Naturally Rehearsing Passwords Jeremiah Blocki ASIACRYPT 2013 Manuel Blum Anupam Datta.
1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton.
Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov Charles Rackoff Comp. Sci. University of Toronto.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords Jeremiah Blocki Saranga Komanduri Lorrie Cranor Anupam Datta NDSS 2015.
GOTCHA Password Hackers! Jeremiah Blocki Manuel Blum Anupam Datta AISec2013 Presented by Arunesh Sinha.
Usable and Secure Password Management Jeremiah Blocki Spring 2012 Theory Lunch.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Authentication and access control.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Course Overview January.
1 Pertemuan 04 Pengamanan Akses Sistem Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Password Management Strategies for Online Accounts Gaw & Felten Optional Reading.
Homework #4 Comments. Passwords: What are they good for? Today passwords are the #1 means of authenticating users on a day-to-day basis. – , Websites,
Human Computable Passwords
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Course Overview January 16, 2007.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Authentication Deniable Authentication Protection Against Dictionary Attacks Isidora Petreska Dimitar Gosevski and.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
1 Authentication and access control overview. 2 Outline Definitions Authentication Factors Evaluation Examples  Focus on password problems and alternatives.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CIS 450 – Network Security Chapter 8 – Password Security.
Strategies for Improving Memory Mnemonics. Examiners often complain that students choose any random strategy when asked in exams. Some strategies are.
Lecture 11: Strong Passwords
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
Visual Authentication Mechanisms. Rationale “Human memory for images is better than for words” Human memory for faces in particular is extremely good.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
REVISITING DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS Mansour Alsaleh,Mohammad Mannan and P.C van Oorschot.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Authentication and access control.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security.
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
Human-Computable Passwords Jeremiah Blocki Manuel Blum Anupam Datta Santosh Vempala.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Secure Quick Reliable Login ● SQRL pronounced “squirrel”. ● Acronym confusion – QR no longer stands for “Quick Response” two-dimensional bar codes. Optional.
Introduction to Web Safety
Towards Human Computable Passwords
Authentication Schemes for Session Passwords using Color and Images
Password Management Limit login attempts Encrypt your passwords
Password Cracking Lesson 10.
Usable and Secure Human Authentication
Human Computable Passwords
Human-Computable Passwords
An Introduction to Web Application Security
Jeremiah Blocki Saranga Komanduri Lorrie Cranor Anupam Datta
Introduction to Computers
Lesson 2: Epic Security Considerations
Security and Usability of Password Based User Authentication Systems
REVISITING DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS Mansour Alsaleh,Mohammad Mannan and P.C van Oorschot.
Presentation transcript:

Naturally Rehearsing Passwords Jeremiah Blocki NSF TRUST October 2013 Manuel Blum Anupam Datta

Password Management Competing Goals: SecurityUsability 2

A Challenging Problem 3 Traditional Security Advice Not too short Use mix of lower/upper case letters Change your passwords every 90 days Use numbers and letters Don’t use words/names Use special symbols Don’t Write it Down Don’t Reuse Passwords

Experiment #0 4 Memorize the following string L~;z&K5De

Memory Experiment 1 5 PersonAlan Turing ActionKissing ObjectPiranha

Memory Experiment 2 PersonBill Gates Actionswallowing Objectbike

Outline 7 Introduction and Experiments Example Password Management Schemes Quantifying Usability Quantifying Security Our Password Management Scheme

Password Management Competing Goals: SecurityUsability 8

Scheme 0: Reuse Weak Password Pick four random words w (e.g., airplane) AccountAmazonEbay Passwordww

Scheme 1: Reuse Strong Password Pick four random words w 1,w 2,w 3,w 4 AccountAmazonEbay Passwordw1w2w3w4w1w2w3w4 w1w2w3w4w1w2w3w4

Scheme 2: Lifehacker Base Pwd + Derivation Rule – Derivation Rule: First two letters + last letter – Three random words Source: AccountAmazonEbay Derivedamneby Passwordw 1 w 2 w 3 amnw 1 w 2 w 3 eby

Scheme 2: Strong Random Independent Four Independent Random Words per Account AccountAmazonEbay Passwordw1w2w3w4w1w2w3w4 x1x2x3x4x1x2x3x4

Questions How can we evaluate password management strategies? – Quantify Usability – Quantify Security Can we design password management schemes which balance security and usability considerations?

Outline 14 Introduction and Experiments Example Password Management Schemes Quantifying Usability – Human Memory – Rehearsal Requirement – Visitation Schedule Quantifying Security Our Password Management Scheme

Human Memory is Semantic Memorize: nbccbsabc Memorize: tkqizrlwp 3 Chunks vs. 9 Chunks! Usability Goal: Minimize Number of Chunks Source: The magical number seven, plus or minus two [Miller, 56] 15

Human Memory is Associative ? 16

Cues 17 Cue: context when a memory is stored Surrounding Environment – Sounds – Visual Surroundings – Web Site – …. As time passes we forget some of this context…

Human Memory is Lossy Rehearse or Forget! – How much work? Quantify Usability – Rehearsal Assumption p amazon p google ???? 18

Quantifying Usability Human Memory is Lossy – Rehearse or Forget! – How much work does this take? Rehearsal Assumptions Visitation Schedule – Natural Rehearsal for frequently visited accounts

Rehearsal Requirement Expanding Rehearsal Assumption: user maintains cue-association pair by rehearsing during each interval [s i, s i+1 ]. Day: Visit Amazon: Natural Rehearsal X t : extra rehearsals to maintain all passwords for t days. Google 20

Rehearsal Requirement Day: X t : extra rehearsals to maintain all passwords for t days. Reuse Password Independent Passwords X8X8 02

Visitation Schedule 22 t1t1 t2t2 t2t2

Visitation Schedule User =1 (daily) =1/3 (biweekly) =1/7 (weekly) =1/31 (monthly) =1/365 (annual) Active10 35 Typical Occasional Infrequent Number of accounts visited with frequency Day: Poisson Process with parameter AmazonGoogle

Usability Results 24 Reuse Strong + Lifehacker Strong Random Independent Active Typical Occasional Infrequent E[X 365 ]: Extra Rehearsals to maintain all passwords over the first year. UsableUnusable

Valuable Resources Protected by Passwords 25

Outline 26 Introduction and Experiments Example Password Management Schemes Quantifying Usability Quantifying Security – Background – Failed Ideas – Our Approach: Security as a Game Our Password Management Scheme

Security (what could go wrong?) OnlineOfflinePhishing Danger Three Types of Attacks 27

Online Attack password Guess Limit: k-strikes policy

Offline Dictionary Attack 29 Username jblocki + jblocki, SHA1( d978034a3f6)=85e23cfe 0021f584e3db87aa72630a9a2345c062 Hash 85e23cfe0021 f584e3db87aa 72630a9a234 5c062 Salt 89d978034a3f6

Plaintext Recovery Attack PayPaul.com 30 pwd

Snowball Effect Source: CERT Incident Note IN-98.03: Password Cracking Activity PayPaul.com + 31 pwd

Password Strength Meters mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm 32 Source:

Entropy (Weaknesses) mmmm G 1 has high entropy, but is insecure! 33

Min-Entropy (Weaknesses) PayPaul.com x x x 34

Our Security Approach 35 Dangerous World Assumption – Not enough to defend against existing adversaries – Adversary can adapt after learning the user’s new password management strategy Provide guarantees even when things go wrong – Offline attacks should fail with high probability – Limit damage of a successful phishing attack

+ Security as a Game PayPaul.com q $1,000,000 guesses p5p5 Sha1(p 4 ) p5p5 p4p4 p3p3 p2p2 p1p1

The Adversary’s Game Adversary can compromise at most r sites (phishing). Adversary can execute offline attacks against at most h additional sites – Resource Constraints => at most q guesses Adversary wins if he can compromise any new sites. 37 pwd Sha1(pwd)

(q, , m,s,r,h)-Security r = #h = # 38 Offline Attack Accounts Phishing Attack Accounts q = # offline guesses m = # of accounts s = # online guesses

Example: (q, , m,3,1,1)-Security PayPaul.co m + q guesses r=1 h=1 39

Security Results (q $1,000,000, ,m,3,r,h)-security Attacks r= 1 h=1 r=2 ReuseNo Strong Random Independent Yes Usable + Insecure Unusable + Secure

Outline 41 Introduction and Experiments Example Password Management Schemes Quantifying Usability Quantifying Security Our Password Management Scheme

Usability Desiderata 42 Minimize #chunks per password Cues to keep context consistent Minimize Interference Maximize Natural Rehearsal What mnemonic techniques do the memory experts use?

Memory Palace 43 Memory champions like Dominic O'Brien regularly use memory palaces

Memory Palace Idea: Humans have excellent visual/spatial memory Memorize a list of words – Memorize: Mentally walk through your house and “store” one word in each location – Recall: Mentally walk past each location to recover each word Key Point: By associating each word with a familiar location we can always recover part of the original cue Source: Rhetorica ad Herennium [Cicero?] 44

Memory Palace Interference? Don’t reuse the same memory palace very often! Memory Champions have hundreds of memory palaces! – Spend time mentally “clearing” each palace before a competition Usability: A typical user doesn’t have time to prepare hundreds of memory palaces! Source: Moonwalking with Einstein [Foer, 2010] 45

Our Approach Object: bike Public Cue Private Action: kicking Object: penguin

Login Kic+Pen + Tor + Lio +... …

Login Kic+Pen + …. …

Sharing Cues Usability Advantages – Fewer stories to remember! – More Natural Rehearsals! Security? Day:

(n,l,  )-Sharing Set Family n n

n n

Security Results (q $1,000,000, ,m,3,r,h)-security Attacks r= 1 h=1 r=2 (n,4,4)-Sharing [Reuse] No (n,4,0)-Sharing [Independent] Yes (n,4,1)-Sharing [SC-1] Yes No (n,4,3)-Sharing [SC-0] YesNoYesNo

Sharing Cues 53 Thm: There is a (43,4,1)-Sharing Set Family of size m=90, and a (9,4,3)-Sharing Set Family of size 126 Proof? – Chinese Remainder Theorem! – Notice that 43 = where 9, 10, 11, 13 are pair wise coprime. – A i uses cues: {i mod 9, i mod 10, i mod 11, i mod 13}

Chinese Remainder Theorem

Example (Account #80) Red Set (9 Cues)Blue Set (10 Cues)Green Set (11 Cues)Purple Set (13 Cues) Cue 0 Cue 1 Cue 2 Cue 3 Cue 4 Cue 5 Cue 6 Cue 7 Cue 8 Cue 9 Cue 10 Cue 11 Cue 12

Example (Account #80) Cue 8Cue 0Cue 3Cue 2 Password 80Secret 8Secret 0Secret 3Secret 2 Public Cue for Account 80

Usability Results 57 ReuseStrong Random Independent SC-1SC-0 Active 0 00 Typical 0 00 Occasional 0 00 Infrequent E[X 365 ]: Extra Rehearsals to maintain all passwords over the first year.

Security Results (q $1,000,000, ,m,3,r,h)-security Attacks r= 1 h=1 r =2 (n,4,4)-Sharing [Reuse] No (n,4,0)-Sharing [Independent] Yes (n,4,1)-Sharing [SC-1] Yes No (n,4,3)-Sharing [SC-0] YesNoYesNo Usable + Insecure Unusable + Secure Usable + Secure

Experiment #0 59 Can anybody remember the 10 character password? L~;z&K5De

Memory Experiment 1 60

Memory Experiment 2

Thanks for Listening!

Backup Slides

User Study Validity of Expanding Rehearsal Assumption Mnemonic Devices and Rehearsal Schedules Collaborate with CyLab Usable Privacy and Security group (CUPS)

User Study Protocol Memorization Phase (5 minutes): – Participants asked to memorize four randomly selected person-action object stories. Rehearsal Phase (90 days): – Participants periodically asked to return and rehearse their stories (following rehearsal schedule)

Password Managers?

Limited Protection