Passwords are widely used for user authentication and, despite their weaknesses, will likely remain in use in the foreseeable future. Human-generated passwords typically have a rich structure, which makes them susceptible to guessing attacks. In this paper, we study the effectiveness of guessing attacks based on Markov models. Our contributions are two-fold. First, we propose a novel password cracker based on Markov models, which builds upon and extends ideas used by Narayanan and Shmatikov (CCS 2005). In extensive experiments we show that it can crack up to 69% of passwords at 10 billion guesses, more than all probabilistic password crackers we compared again t. Second, we systematically analyze the idea that additional personal information about a user helps in speeding up password guessing. We find that, on average and by carefully choosing parameters, we can guess up to 5% more passwords, especially when the number of attempts is low. Furthermore, we show that the gain can go up to 30% for passwords that are actually based on personal attributes. These passwords are clearly weaker and should be avoided. Our cracker could be used by an organization to detect and reject them. To the best of our knowledge, we are the first to systematically study the relationship between chosen passwords and users' personal information. We test and validate our results over a wide collection of leaked password databases.
[1]
Vitaly Shmatikov,et al.
Fast dictionary attacks on passwords using time-space tradeoff
,
2005,
CCS '05.
[2]
Gershon Kedem,et al.
Brute Force Attack on UNIX Passwords with SIMD Computer
,
1999,
USENIX Security Symposium.
[3]
Frank Stajano,et al.
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
,
2012,
2012 IEEE Symposium on Security and Privacy.
[4]
Pietro Michiardi,et al.
Password Strength: An Empirical Analysis
,
2010,
2010 Proceedings IEEE INFOCOM.
[5]
David Mazières,et al.
A future-adaptive password scheme
,
1999
.
[6]
Sudhir Aggarwal,et al.
Password Cracking Using Probabilistic Context-Free Grammars
,
2009,
2009 30th IEEE Symposium on Security and Privacy.
[7]
Sudhir Aggarwal,et al.
Testing metrics for password creation policies by attacking large sets of revealed passwords
,
2010,
CCS '10.
[8]
Claude Castelluccia,et al.
Adaptive Password-Strength Meters from Markov Models
,
2012,
NDSS.