On the Implications of Zipf's Law in Passwords
Authors: Ding Wang, Ping Wang

Date: September 26 2016
Publication: ESORICS 2016, Lecture Notes in Computer Science Volume 9878
Page(s): 111 - 131
Publisher: Springer
Source 1: https://dx.doi.org/10.1007/978-3-319-45744-4_6 - Subscription or payment required
Source 2: http://wangdingg.weebly.com/uploads/2/0/3/6/20366987/esorics16_final.pdf

Abstract or Summary:
Textual passwords are perhaps the most prevalent mechanism for access control over the Internet. Despite the fact that human-beings generally select passwords in a highly skewed way, it has long been assumed in the password research literature that users choose passwords randomly and uniformly. This is partly because it is easy to derive concrete (numerical) security results under the uniform assumption, and partly because we do not know whats the exact distribution of passwords if we do not make a uniform assumption. Fortunately, researchers recently reveal that user-chosen passwords generally follow the Zipfs law, a distribution which is vastly different from the uniform one.

In this work, we explore a number of foundational security implications of the Zipf-distribution assumption about passwords. Firstly, we how the attackers advantages against password-based cryptographic protocols (e.g., authentication, encryption, signature and secret share) can be 24 orders of magnitude more accurately captured (formulated) than existing formulation results. As password protocols are the most widely used cryptographic protocols, our new formulation is of practical significance. Secondly, we provide new insights into popularity-based password creation policies and point out that, under the current, widely recommended security parameters, usability will be largely impaired. Thirdly, we show that the well-known password strength metric \(\alpha \)-guesswork, which was believed to be parametric, is actually non-parametric in two of four cases under the Zipf assumption. Particularly, nine large-scale, real-world password datasets are employed to establish the practicality of our findings.

Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.

<-- Back to Authentication Research Paper Index

[Home] [About Us] [News] [Research]

Copyright © 2019 PasswordResearch.com