Главная
Study mode:
on
1
Intro
2
Offline Attacks: A Common Problem
3
Key Stretching
4
Strong Claims (Post Breaches)
5
Decision Theoretic Model
6
User Password Distribution
7
Threshold Function of Doom
8
An "Optimistic" Picture
9
Memory Hard Functions (MHF)
10
Executive Summary of Our Findings
11
Recommendations for Organizations
Description:
Explore an economic model of offline password cracking in this IEEE Symposium on Security & Privacy presentation. Delve into the analysis of major password breaches at Yahoo!, Dropbox, LastPass, and AshleyMadison, revealing the inadequacy of current key-stretching techniques. Examine the Zipf's law distribution of user passwords and its implications for rational attackers. Discover the finite threshold that determines an attacker's optimal strategy and learn why most user passwords are at risk. Investigate the potential of memory hard functions (MHFs) like SCRYPT or Argon2i in significantly reducing offline attack damage. Gain insights into recommended updates for password hashing standards, emphasizing the importance of MHFs and the need to phase out non-memory hard functions like BCRYPT or PBKDF2.

On the Economics of Offline Password Cracking

IEEE
Add to list
0:00 / 0:00