CompChall: addressing password guessing attacks

Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large number of login requests per unit time as in the case of an online dictionary attack. The protocol is stateless and thus less vulnerable to DoS (Denial of Service) attacks.

[1]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Ken Thompson,et al.  Password security: a case history , 1979, CACM.

[3]  Ronald L. Rivest,et al.  Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.

[4]  Daniel Klein,et al.  Foiling the cracker: A survey of, and improvements to, password security , 1992 .

[5]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[6]  Hugo Krawczyk,et al.  Public-key cryptography and password protocols , 1998, CCS '98.

[7]  Vipul Goyal,et al.  How To Re-initialize a Hash Chain , 2004, IACR Cryptol. ePrint Arch..

[8]  Benny Pinkas,et al.  Securing passwords against dictionary attacks , 2002, CCS '02.

[9]  Jitendra Malik,et al.  Recognizing objects in adversarial clutter: breaking a visual CAPTCHA , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..

[10]  Hugo Krawczyk,et al.  Public-key cryptography and password protocols , 1999 .