Breaking Our Password Hash Habit
Author(s): Cormac Herley, Stuart Schechter

Date: June 2013
Publication: The Twelfth Workshop on the Economics of Information Security, WEIS 2013
Source 1: http://weis2013.econinfosec.org/papers/SchechterHerleyWEIS2013.pdf
Source 2: http://research.microsoft.com/pubs/197920/SchechterHerleyWEIS2013.pdf

Abstract:
Attackers only get better at guessing the passwords users will create under a given set of password-composition constraints. They learn more about users' password-selection behaviors each time they compromise a passsword, regardless of whether they obtain the password by breaching a password database, installing a key logger, phishing, or by guessing.

Defensive analysis of user-chosen passwords could similarly identify predictable password-selection behaviors and help us to prevent users from choosing predictable passwords. Alas, attempts to perform such analysis have been stunted by requirements to encrypt passwords irreversibly and by the indignation shown for those who would try to analyze the passwords their users choose.

We argue that encrypting passwords irreversibly has done more harm than good, providing a minimal short-term reduction in risk as opposed to reversible encryption, but imposing a severe cost on our ability to improve password defenses for the long term. As encrypting passwords is of little value if users continue to choose passwords that are easily guessed, our collective choice to blind ourselves to our users' passwords has made us collectively less secure. We argue that passwords should be encrypted so as to allow for online defensive analysis.

While we believe there's a strong case to be made that the social benefits of defensive password analysis outweigh the risks, the individual cost/benefit tradeoff discourages users and firms from contributing passwords for defensive analysis. When choosing a password, an individual may benefit from analyses based on others' prior contributions, but does not benefit from contributing the password she chooses. However, she bears the risk should the password she has chosen is compromised as a result of contributing. This makes making free-riding on others' password contributions the security-optimizing strategy for her as an individual. To solve this free rider problem, we propose that systems that help to prevent users from choosing weak passwords (informed by prior users' passwords choices), require that those using the system contribute their newly-chosen passwords in return.




Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.

<-- Back to Authentication Research Paper Index





[Home] [About Us] [News] [Research]

Copyright 2013 PasswordResearch.com