Access Control


Password Cracking: Case I



tải về 2.19 Mb.
trang4/15
Chuyển đổi dữ liệu01.03.2024
Kích2.19 Mb.
#56689
1   2   3   4   5   6   7   8   9   ...   15
Lecture 04 Access control new (1)

Password Cracking: Case I

Password Cracking: Case II

  • Attack 1 specific password with dictionary
  • With salt
    • Expected work: 1/4 (219) + 3/4 (255) ≈ 254.6
    • In practice, try all pwds in dictionary…
    • …then work is at most 220 and probability of success is 1/4
  • What if no salt is used?
    • One-time work to compute dictionary: 220
    • Expected work is of same order as above
    • But with precomputed dictionary hashes, the “in practice” attack is essentially free…

Password Cracking: Case III

  • Any of 1024 pwds in file, without dictionary
  • If no salt is used
    • Each computed hash yields 210 comparisons
    • So expected work (hashes) is 255/210 = 245
  • If salt is used

Password Cracking: Case IV

  • Any of 1024 pwds in file, with dictionary
  • If salt is used, expected work less than 222
    • See book, or slide notes for details
    • Work ≈ size of dictionary / P(pwd in dictionary)
  • What if no salt is used?
    • If dictionary hashes not precomputed, work is about 219/210 = 29

Other Password Issues

  • Too many passwords to remember
    • Results in password reuse
    • Why is this a problem?
  • Who suffers from bad password?
  • Failure to change default passwords
  • Social engineering
  • Error logs may contain “almost” passwords
  • Bugs, keystroke logging, spyware, etc.

tải về 2.19 Mb.

Chia sẻ với bạn bè của bạn:
1   2   3   4   5   6   7   8   9   ...   15




Cơ sở dữ liệu được bảo vệ bởi bản quyền ©hocday.com 2024
được sử dụng cho việc quản lý

    Quê hương