Pushing on String: The “Don’t Care” Region of Password Strength
Date: November 2016
Publication: Communications of the ACM, Vol. 59 No. 11
Page(s): 66 - 74
Source 1: https://www.microsoft.com/en-us/research/wp-content/uploads/2016/09/pushingOnString.pdf
Source 2: http://people.scs.carleton.ca/~paulv/papers/pushingOnString-authorcopy.pdf
Source 3: https://cacm.acm.org/magazines/2016/11/209115-pushing-on-string/abstract - Subscription or payment required
Abstract or Summary:
We examine the efficacy of tactics for defending password-protected networks from guessing attacks, taking the viewpoint of an enterprise administrator whose objective is to protect a population of passwords. Simple analysis allows insights on the limits of common approaches, and reveals that some approaches spend effort in “don’t care” regions where added password strength makes no difference. This happens either when passwords do more than enough to resist online attacks while falling short of what’s needed against offline attacks, or when so many accounts have fallen that an attacker gains little from additional compromises. Our review of tools available to improve attack-resistance finds, for example, that compelling returns are offered by password blacklists, throttling and hash iteration, while current password composition policies fail to provide demonstrable improvement in outcomes against offline guessing attacks.
Do you have additional information to contribute regarding this research paper? If so, please email firstname.lastname@example.org with the details.