Password Cracking: Case I Password Cracking: Case II - Attack 1 specific password with dictionary
- With salt
- Expected work: 1/4 (219) + 3/4 (255) ≈ 254.6
- In practice, try all pwds in dictionary…
- …then work is at most 220 and probability of success is 1/4
- What if no salt is used?
- One-time work to compute dictionary: 220
- Expected work is of same order as above
- But with precomputed dictionary hashes, the “in practice” attack is essentially free…
Password Cracking: Case III - Any of 1024 pwds in file, without dictionary
- If no salt is used
- Each computed hash yields 210 comparisons
- So expected work (hashes) is 255/210 = 245
- If salt is used
Password Cracking: Case IV - Any of 1024 pwds in file, with dictionary
- If salt is used, expected work less than 222
- See book, or slide notes for details
- Work ≈ size of dictionary / P(pwd in dictionary)
- What if no salt is used?
- If dictionary hashes not precomputed, work is about 219/210 = 29
- Too many passwords to remember
- Results in password reuse
- Why is this a problem?
- Who suffers from bad password?
- Failure to change default passwords
- Social engineering
- Error logs may contain “almost” passwords
- Bugs, keystroke logging, spyware, etc.
Chia sẻ với bạn bè của bạn: |