2021
DOI: 10.1007/978-3-030-90370-1_18
|View full text |Cite
|
Sign up to set email alerts
|

Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…However, because Ψ u and K u are stored on the authentication server, this would signal information about the strength of pw u to an offline attacker. While this seems undesirable, a recent counter-intuitive result showed that noisy strength signals can actually help deter a rational utility maximizing password cracker [1] if the signaling scheme is tuned appropriately. Thus, it is possible that a noisy (randomized) mechanism to tune Ψ u based on the strength of the user's password could help deter offline attackers.…”
Section: Extending the K-strikes Mechanismmentioning
confidence: 99%
“…However, because Ψ u and K u are stored on the authentication server, this would signal information about the strength of pw u to an offline attacker. While this seems undesirable, a recent counter-intuitive result showed that noisy strength signals can actually help deter a rational utility maximizing password cracker [1] if the signaling scheme is tuned appropriately. Thus, it is possible that a noisy (randomized) mechanism to tune Ψ u based on the strength of the user's password could help deter offline attackers.…”
Section: Extending the K-strikes Mechanismmentioning
confidence: 99%