Universal Randomized Guessing With Application to Asynchronous Decentralized Brute–Force Attacks

Consider the problem of guessing the realization of a random vector <inline-formula> <tex-math notation="LaTeX">${X}$ </tex-math></inline-formula> by repeatedly submitting queries (guesses) of the form “Is <inline-formula> <tex-math notation="LaTeX">${X}$ </tex-math></inline-formula> equal to <inline-formula> <tex-math notation="LaTeX">${x}$ </tex-math></inline-formula>?” until an affirmative answer is obtained. In this setup, a key figure of merit is the number of queries required until the right vector is identified, a number that is termed the <italic>guesswork</italic>. Typically, one wishes to devise a guessing strategy which minimizes a certain guesswork moment. In this work, we study a universal, decentralized scenario where the guesser does not know the distribution of <inline-formula> <tex-math notation="LaTeX">${X}$ </tex-math></inline-formula>, and is not allowed to use a strategy which prepares a list of words to be guessed in advance, or even remember which words were already used. Such a scenario is useful, for example, if bots within a Botnet carry out a brute–force attack in order to guess a password or decrypt a message, yet cannot coordinate the guesses between them or even know how many bots actually participate in the attack. We devise universal decentralized guessing strategies, first, for memoryless sources, and then generalize them for finite–state sources. In each case, we derive the guessing exponent, and then prove its asymptotic optimality by deriving a compatible converse bound. The strategies are based on randomized guessing using a universal distribution. We also extend the results to guessing with side information. Finally, for all above scenarios, we design efficient algorithms in order to sample from the universal distributions, resulting in strategies which do not depend on the source distribution, are efficient to implement, and can be used asynchronously by multiple agents.

[1]  Suhas N. Diggavi,et al.  The effect of bias on the guesswork of hash functions , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[2]  Neri Merhav Universal detection of messages via finite-state channels , 2000, IEEE Trans. Inf. Theory.

[3]  A. Robert Calderbank,et al.  A geometric perspective on guesswork , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[4]  Ronald L. Rivest,et al.  Honeywords: making password-cracking detectable , 2013, CCS.

[5]  David Malone,et al.  Guesswork and entropy , 2004, IEEE Transactions on Information Theory.

[6]  Neri Merhav,et al.  Guessing Subject to Distortion , 1998, IEEE Trans. Inf. Theory.

[7]  Sergio Verdú,et al.  Improved Bounds on Lossless Source Coding and Guessing Moments via Rényi Measures , 2018, IEEE Transactions on Information Theory.

[8]  John M. Wozencraft,et al.  Sequential decoding for reliable communication , 1957 .

[9]  Wojciech Szpankowski,et al.  Minimum Expected Length of Fixed-to-Variable Lossless Compression Without Prefix Constraints , 2011, IEEE Transactions on Information Theory.

[10]  C. E. Pfister,et al.  Renyi entropy, guesswork moments, and large deviations , 2004, IEEE Transactions on Information Theory.

[11]  J. Ziv,et al.  On the optimal asymptotic performance of universal ordering and of discrimination of individual sequences , 1992, IEEE Trans. Inf. Theory.

[12]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[13]  John O. Pliam On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks , 2000, INDOCRYPT.

[14]  Sudhir Aggarwal,et al.  Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[15]  Jacob Ziv,et al.  Universal decoding for finite-state channels , 1985, IEEE Trans. Inf. Theory.

[16]  Neri Merhav,et al.  Hidden Markov processes , 2002, IEEE Trans. Inf. Theory.

[17]  Abraham Lempel,et al.  Compression of individual sequences via variable-rate coding , 1978, IEEE Trans. Inf. Theory.

[18]  Ken R. Duffy,et al.  Guesswork subject to a total entropy budget , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[19]  Lujo Bauer,et al.  Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms , 2011, 2012 IEEE Symposium on Security and Privacy.

[20]  A. Robert Calderbank,et al.  Quantifying computational security subject to source constraints, guesswork and inscrutability , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[21]  Rajesh Sundaresan,et al.  Guessing Revisited: A Large Deviations Approach , 2010, IEEE Transactions on Information Theory.

[22]  Ping Wang,et al.  A Security Analysis of Honeywords , 2018, NDSS.

[23]  Pietro Michiardi,et al.  Password Strength: An Empirical Analysis , 2010, 2010 Proceedings IEEE INFOCOM.

[24]  Ken R. Duffy,et al.  Multi-User Guesswork and Brute Force Security , 2015, IEEE Transactions on Information Theory.

[25]  Ken R. Duffy,et al.  Guesswork, Large Deviations, and Shannon Entropy , 2012, IEEE Transactions on Information Theory.

[26]  Emanuel Tirado,et al.  A New Distributed Brute-Force Password Cracking Technique , 2018, FNSS.

[27]  Raphail E. Krichevsky,et al.  The performance of universal encoding , 1981, IEEE Trans. Inf. Theory.

[28]  Joseph Bonneau,et al.  The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.

[29]  Jeanna Neefe Matthews,et al.  A Study of Passwords and Methods Used in Brute-Force SSH Attacks , 2008 .

[30]  Muriel Médard,et al.  Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization , 2018, IEEE Transactions on Information Forensics and Security.

[31]  Sergio Verdú,et al.  Cumulant generating function of codeword lengths in optimal lossless compression , 2014, 2014 IEEE International Symposium on Information Theory.

[32]  Muriel Médard,et al.  Centralized vs decentralized multi-agent guesswork , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[33]  C. E. Veni Madhavan,et al.  Efficient dictionary for salted password analysis , 2014, 2014 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).

[34]  Shigeaki Kuzuoka,et al.  Conditional Lempel-Ziv complexity and its application to source coding theorem with side information , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[35]  J. Massey Guessing and entropy , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[36]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[37]  Rajesh Sundaresan Guessing Under Source Uncertainty , 2006 .

[38]  Sergio Verdú,et al.  Optimal Lossless Data Compression: Non-Asymptotics and Asymptotics , 2014, IEEE Transactions on Information Theory.

[39]  Rajesh Sundaresan Guessing Under Source Uncertainty With Side Information , 2006, 2006 IEEE International Symposium on Information Theory.

[40]  J. Yan,et al.  Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.

[41]  P. Gauravaram,et al.  Security Analysis of salt||password Hashes , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[42]  Sergio Verdú,et al.  Variable-length lossy compression and channel coding: Non-asymptotic converses via cumulant generating functions , 2014, 2014 IEEE International Symposium on Information Theory.

[43]  Yuhong Yang Elements of Information Theory (2nd ed.). Thomas M. Cover and Joy A. Thomas , 2008 .

[44]  Amos Lapidoth,et al.  Guessing Attacks on Distributed-Storage Systems , 2019, IEEE Transactions on Information Theory.

[45]  David Malone,et al.  Investigating the distribution of password choices , 2011, WWW.

[46]  Matt Bishop,et al.  Improving system security via proactive password checking , 1995, Comput. Secur..

[47]  Ken R. Duffy,et al.  Guessing a password over a wireless channel (on the effect of noise non-uniformity) , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[48]  Lujo Bauer,et al.  Of passwords and people: measuring the effect of password-composition policies , 2011, CHI.

[49]  Oliver Kosut,et al.  Asymptotics and Non-Asymptotics for Universal Fixed-to-Variable Source Coding , 2014, IEEE Transactions on Information Theory.

[50]  Neri Merhav,et al.  Universal coding with minimum probability of codeword length overflow , 1991, IEEE Trans. Inf. Theory.

[51]  E. Arıkan An inequality on guessing and its application to sequential decoding , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.

[52]  Neri Merhav,et al.  Universal prediction of individual sequences , 1992, IEEE Trans. Inf. Theory.

[53]  Meir Feder,et al.  Gambling using a finite state machine , 1991, IEEE Trans. Inf. Theory.