Passwords and Cryptwords The Final Limits on Lengths

被引:0
作者
Clark, Michael [1 ]
Seamons, Kent [1 ]
机构
[1] Brigham Young Univ, Provo, UT 84602 USA
来源
NEW SECURITY PARADIGMS WORKSHOP, NSPW 2022 | 2023年
基金
美国国家科学基金会;
关键词
passwords; cryptwords; authentication; SECURITY;
D O I
10.1145/3584318.3584324
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computers get faster every year; brains don't. Passwords and other memorized credentials have unique usability advantages over tokens and biometrics, so we desire to design secure systems that maintain lengths that users can memorize. Some passwords are subject primarily to online attacks, and are simple to defend with rate limits and lockouts. Others, used to generate encryption keys, must be secure against offline attacks. We coin the term "cryptword" to distinguish these from passwords subject primarily to online attacks. Authentication passwords do not need to get longer as computers get faster, if protected by rate limits and lockouts. Using password key derivation functions (pwKDFs) - a class of preexisting cryptographic algorithms - we show that cryptwords can also remain the same length and maintain their security strength despite advances in computation. We achieve this by regularly updating the pwKDF parameters and regenerating the derived key from the cryptword. In cases where it is not possible to meaningfully regenerate the derived key, such as archival data or public verifiers, cryptword lengths should be chosen to last the lifetime of the data. We provide simple equations that end users and system administrators can use to determine minimal assigned password and cryptword lengths based on personal threat models. We also show how to use the capabilities of cloud computing providers to estimate attacker costs. These same equations give a timeframe for cryptword and secret rotation once the encrypted data leaks. Because these equations do not rely on the current date or current hardware capabilities, they show that if regularly used, password and cryptword lengths can remain constant despite improvements in hardware.
引用
收藏
页码:75 / 89
页数:15
相关论文
共 68 条
  • [1] Towards Practical Attacks on Argon2i and Balloon Hashing
    Alwen, Joel
    Blocki, Jeremiah
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 142 - 157
  • [2] Amazon Web Services Inc, 2022, Amazon EC2 Spot-Save upto 90% on OnDemand Prices
  • [3] Edholm's law of bandwidth
    不详
    [J]. IEEE SPECTRUM, 2004, 41 (07) : 58 - +
  • [4] [Anonymous], 2012, P 8 S US PRIV SEC
  • [5] [Anonymous], 1996, Minimal key lengths for symmetric ciphers to provide adequate commercial security
  • [6] [Anonymous], 2020, Passwortkarten: Konzepte und Generatoren
  • [7] [Anonymous], 2012, WiredMarch 15
  • [8] anti-captcha, Anti Captcha: Captcha Solving Service
  • [9] Aumasson Jean-Philippe, 2019, Password Hashing Competition
  • [10] Bc Vojtech Polasek, 2019, Argon2 security margin for disk encryption passwords