2012
DOI: 10.1007/s10845-012-0670-5
|View full text |Cite
|
Sign up to set email alerts
|

Fast password recovery attack: application to APOP

Abstract: Abstract. In this paper, we propose a fast password recovery attack to APOP application in local which can recover a password with 11 characters in less than one minute, recover a password with 31 characters extremely fast, about 4 minutes, and for 43 characters in practical time. These attacks truly simulate the practical password recovery attacks launched by malware in real life, and further confirm that the security of APOP is totally broken. To achieve these dramatical improvements, we propose a group sati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2012
2012
2015
2015

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 22 publications
0
3
0
1
Order By: Relevance
“…Second, with the efficient password cracking using probabilistic context‐free grammars, we further improve it to quickly crack the known‐length password. We confirm that it is unsuitable to further deploy PPPoE in commercial using until all of the proven weak authentication protocols are abolished and replaced with more secure Extensible Authentication Protocols (EAPs), and the security of MD5‐based network applications should be re‐evaluated .…”
Section: Introductionmentioning
confidence: 84%
“…Second, with the efficient password cracking using probabilistic context‐free grammars, we further improve it to quickly crack the known‐length password. We confirm that it is unsuitable to further deploy PPPoE in commercial using until all of the proven weak authentication protocols are abolished and replaced with more secure Extensible Authentication Protocols (EAPs), and the security of MD5‐based network applications should be re‐evaluated .…”
Section: Introductionmentioning
confidence: 84%
“…В настоящее время протокол APOP считается скомпрометирован-ным, так как его применение позволит злоумышленнику (который выдает себя за почтовый сервер) за разумное время восстановить до 43 символов (байт) пароля [7]. Опишем стратегию, применяемую для выполнения атаки на протокол APOP.…”
Section: Md5unclassified
“…MD5 [11,17,7,8] is a typical Merkle-Damgård structure hash function, which takes a variable-length message M as input and outputs a 128-bit hash value. M is first padded to be multiples of 512 bits, a '1' added at the tail of M , followed by '0's until the bit length becomes 448 on modulo 512, finally, the length of the unpadded message M is inserted to the last 64 bits.…”
Section: Brief Description Of Md5mentioning
confidence: 99%