This paper explains the sync problem and compares solutions in Firefox 4 and Chrome 10. The sync problem studies how to securely synchronize data across different computers. Google has added a built-in sync function in Chrome 10, which uses a user-defined password to encrypt bookmarks, history, cached passwords etc. However, due to the low-entropy of passwords, the encryption is inherently weak --- anyone with access to the ciphertext can easily uncover the key (and hence disclose the plaintext). Mozilla used to have a very similar sync solution in Firefox 3.5, but since Firefox 4 it has made a complete change of how sync works in the browser. The new solution is based on a security protocol called J-PAKE, which is a balanced Password Authenticated Key Exchange (PAKE) protocol. To our best knowledge, this is the first large-scale deployment of the PAKE technology. Since PAKE does not require a PKI, it has compelling advantages than PKI-based schemes such as SSL/TLS in many applications. However, in the past decade, deploying PAKE has been greatly hampered by the patent and other issues. With the rise of patent-free solutions such as J-PAKE and also that the EKE patent will soon expire in October, 2011, we believe the PAKE technology will be more widely adopted in the near future.
[1]
Muxiang Zhang.
Analysis of the SPEKE password-authenticated key exchange protocol
,
2004,
IEEE Commun. Lett..
[2]
Feng Hao,et al.
Password Authenticated Key Exchange by Juggling
,
2008,
Security Protocols Workshop.
[3]
Feng Hao,et al.
J-PAKE: Authenticated Key Exchange without PKI
,
2010,
Trans. Comput. Sci..
[4]
Feng Hao,et al.
On Small Subgroup Non-confinement Attack
,
2010,
2010 10th IEEE International Conference on Computer and Information Technology.
[5]
David P. Jablon.
Strong password-only authenticated key exchange
,
1996,
CCRV.
[6]
Steven M. Bellovin,et al.
Encrypted key exchange: password-based protocols secure against dictionary attacks
,
1992,
Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[7]
Barry Jaspan,et al.
Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks
,
1996,
USENIX Security Symposium.