首页 > 最新文献

International Conference on Security and Cryptography for Networks最新文献

英文 中文
Cost-Asymmetric Memory Hard Password Hashing 成本非对称内存硬密码哈希
Pub Date : 2022-06-26 DOI: 10.48550/arXiv.2206.12970
Wenjie Bai, Jeremiah Blocki, Mohammad Hassan Ameri
In the past decade, billions of user passwords have been exposed to the dangerous threat of offline password cracking attacks. An offline attacker who has stolen the cryptographic hash of a user's password can check as many password guesses as s/he likes limited only by the resources that s/he is willing to invest to crack the password. Pepper and key-stretching are two techniques that have been proposed to deter an offline attacker by increasing guessing costs. Pepper ensures that the cost of rejecting an incorrect password guess is higher than the (expected) cost of verifying a correct password guess. This is useful because most of the offline attacker's guesses will be incorrect. Unfortunately, as we observe the traditional peppering defense seems to be incompatible with modern memory hard key-stretching algorithms such as Argon2 or Scrypt. We introduce an alternative to pepper which we call Cost-Asymmetric Memory Hard Password Authentication which benefits from the same cost-asymmetry as the classical peppering defense i.e., the cost of rejecting an incorrect password guess is larger than the expected cost to authenticate a correct password guess. When configured properly we prove that our mechanism can only reduce the percentage of user passwords that are cracked by a rational offline attacker whose goal is to maximize (expected) profit i.e., the total value of cracked passwords minus the total guessing costs. We evaluate the effectiveness of our mechanism on empirical password datasets against a rational offline attacker. Our empirical analysis shows that our mechanism can reduce significantly the percentage of user passwords that are cracked by a rational attacker by up to 10%.
在过去的十年里,数十亿用户的密码暴露在离线密码破解攻击的危险威胁之下。离线攻击者窃取了用户密码的加密散列后,可以检查任意多的密码猜测,只受他/她愿意为破解密码而投入的资源的限制。胡椒和键拉伸是两种被提议通过增加猜测成本来阻止离线攻击者的技术。Pepper确保拒绝错误密码猜测的成本高于验证正确密码猜测的(预期)成本。这很有用,因为大多数离线攻击者的猜测都是错误的。不幸的是,正如我们观察到的那样,传统的胡椒防御似乎与现代内存硬键扩展算法(如Argon2或Scrypt)不兼容。我们引入了一种替代胡椒的方法,我们称之为成本非对称内存硬密码认证,它受益于与经典胡椒防御相同的成本非对称,即拒绝错误密码猜测的成本大于验证正确密码猜测的预期成本。当配置正确时,我们证明我们的机制只能减少用户密码被理性的离线攻击者破解的百分比,攻击者的目标是最大化(预期)利润,即破解密码的总价值减去总猜测成本。我们评估了我们在经验密码数据集上针对理性离线攻击者的机制的有效性。我们的实证分析表明,我们的机制可以显著降低用户密码被理性攻击者破解的比例,最多可降低10%。
{"title":"Cost-Asymmetric Memory Hard Password Hashing","authors":"Wenjie Bai, Jeremiah Blocki, Mohammad Hassan Ameri","doi":"10.48550/arXiv.2206.12970","DOIUrl":"https://doi.org/10.48550/arXiv.2206.12970","url":null,"abstract":"In the past decade, billions of user passwords have been exposed to the dangerous threat of offline password cracking attacks. An offline attacker who has stolen the cryptographic hash of a user's password can check as many password guesses as s/he likes limited only by the resources that s/he is willing to invest to crack the password. Pepper and key-stretching are two techniques that have been proposed to deter an offline attacker by increasing guessing costs. Pepper ensures that the cost of rejecting an incorrect password guess is higher than the (expected) cost of verifying a correct password guess. This is useful because most of the offline attacker's guesses will be incorrect. Unfortunately, as we observe the traditional peppering defense seems to be incompatible with modern memory hard key-stretching algorithms such as Argon2 or Scrypt. We introduce an alternative to pepper which we call Cost-Asymmetric Memory Hard Password Authentication which benefits from the same cost-asymmetry as the classical peppering defense i.e., the cost of rejecting an incorrect password guess is larger than the expected cost to authenticate a correct password guess. When configured properly we prove that our mechanism can only reduce the percentage of user passwords that are cracked by a rational offline attacker whose goal is to maximize (expected) profit i.e., the total value of cracked passwords minus the total guessing costs. We evaluate the effectiveness of our mechanism on empirical password datasets against a rational offline attacker. Our empirical analysis shows that our mechanism can reduce significantly the percentage of user passwords that are cracked by a rational attacker by up to 10%.","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132886002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Round Complexity of Secure Computation Against Covert Adversaries 针对隐蔽对手的安全计算的轮复杂度
Pub Date : 2020-09-14 DOI: 10.1007/978-3-030-57990-6_30
A. Choudhuri, Vipul Goyal, Abhishek Jain
{"title":"The Round Complexity of Secure Computation Against Covert Adversaries","authors":"A. Choudhuri, Vipul Goyal, Abhishek Jain","doi":"10.1007/978-3-030-57990-6_30","DOIUrl":"https://doi.org/10.1007/978-3-030-57990-6_30","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126639919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Afgjort: A Partially Synchronous Finality Layer for Blockchains Afgjort:区块链的部分同步终结层
Pub Date : 2020-09-14 DOI: 10.1007/978-3-030-57990-6_2
Thomas Dinsdale-Young, Bernardo Magri, C. Matt, J. Nielsen, Daniel Tschudi
{"title":"Afgjort: A Partially Synchronous Finality Layer for Blockchains","authors":"Thomas Dinsdale-Young, Bernardo Magri, C. Matt, J. Nielsen, Daniel Tschudi","doi":"10.1007/978-3-030-57990-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-57990-6_2","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130387233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Multi-clients Verifiable Computation via Conditional Disclosure of Secrets 基于条件秘密披露的多客户端可验证计算
Pub Date : 2020-09-14 DOI: 10.1007/978-3-030-57990-6_8
Rishabh Bhadauria, Carmit Hazay
{"title":"Multi-clients Verifiable Computation via Conditional Disclosure of Secrets","authors":"Rishabh Bhadauria, Carmit Hazay","doi":"10.1007/978-3-030-57990-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-57990-6_8","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132566862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gradual GRAM and Secure Computation for RAM Programs RAM程序的渐进GRAM和安全计算
Pub Date : 2020-09-14 DOI: 10.1007/978-3-030-57990-6_12
Carmit Hazay, Mor Lilintal
{"title":"Gradual GRAM and Secure Computation for RAM Programs","authors":"Carmit Hazay, Mor Lilintal","doi":"10.1007/978-3-030-57990-6_12","DOIUrl":"https://doi.org/10.1007/978-3-030-57990-6_12","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Separating Symmetric and Asymmetric Password-Authenticated Key Exchange 分离对称和非对称密码认证密钥交换
Pub Date : 2020-09-14 DOI: 10.1007/978-3-030-57990-6_29
Julia Hesse
{"title":"Separating Symmetric and Asymmetric Password-Authenticated Key Exchange","authors":"Julia Hesse","doi":"10.1007/978-3-030-57990-6_29","DOIUrl":"https://doi.org/10.1007/978-3-030-57990-6_29","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134416389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption 基于决策线性假设的等大小密文表达属性加密
Pub Date : 2020-01-01 DOI: 10.1007/978-3-319-10879-7_17
K. Takashima
{"title":"Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption","authors":"K. Takashima","doi":"10.1007/978-3-319-10879-7_17","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_17","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127460364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Evolving Ramp Secret-Sharing Schemes 不断发展的坡道秘密共享方案
Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_17
A. Beimel, Hussien Othman
{"title":"Evolving Ramp Secret-Sharing Schemes","authors":"A. Beimel, Hussien Othman","doi":"10.1007/978-3-319-98113-0_17","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_17","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Unforgeable Watermarking Schemes with Public Extraction 具有公共提取的不可伪造水印方案
Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_4
Rupeng Yang, M. Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
{"title":"Unforgeable Watermarking Schemes with Public Extraction","authors":"Rupeng Yang, M. Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu","doi":"10.1007/978-3-319-98113-0_4","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_4","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
More Efficient Commitments from Structured Lattice Assumptions 结构化晶格假设更有效的承诺
Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_20
Carsten Baum, I. Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
{"title":"More Efficient Commitments from Structured Lattice Assumptions","authors":"Carsten Baum, I. Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert","doi":"10.1007/978-3-319-98113-0_20","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_20","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122402249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
期刊
International Conference on Security and Cryptography for Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1