Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Encryption Security IT

NYU Group Says Its Scheme Makes Cracking Individual Passwords Impossible 277

An anonymous reader writes "Researchers at New York University have devised a new scheme called PolyPassHash for storing password hash data so that passwords cannot be individually cracked by an attacker. Instead of a password hash being stored directly in the database, the information is used to encode a share in a Shamir Secret Store (technical details PDF). This means that a password cannot be validated without recovering a threshold of shares, thus an attacker must crack groups of passwords together. The solution is fast, easy to implement (with C and Python implementations available), requires no changes to clients, and makes a huge difference in practice. To put the security difference into perspective, three random 6 character passwords that are stored using standard salted secure hashes can be cracked by a laptop in an hour. With a PolyPassHash store, it would take every computer on the planet longer to crack these passwords than the universe is estimated to exist. With this new technique, HoneyWords, and hardware solutions all available, does an organization have any excuse if their password database is disclosed and user passwords are cracked?."
This discussion has been archived. No new comments can be posted.

NYU Group Says Its Scheme Makes Cracking Individual Passwords Impossible

Comments Filter:
  • WTF? (Score:4, Insightful)

    by JMZero ( 449047 ) on Thursday April 03, 2014 @11:36AM (#46649751) Homepage

    To be useful, the system still needs to be able to tell whether a single user password is correct (and needs to do so reasonably efficiently). So if someone has a 6 character password (which is dumb) you can just try all possible passwords (there isn't that many possible 6 realistic character passwords). Either lots of them work (which would a problem) or you found the password. And it didn't take all the computers in the universe forever to do so.

    Maybe this is a great system, but the hyperbole in the summary is ridiculous.

  • Re:WTF? (Score:3, Insightful)

    by pastafazou ( 648001 ) on Thursday April 03, 2014 @11:40AM (#46649777)
    Posit: An infinite number of monkeys on an infinite number of keyboards will eventually crack all your passwords.
  • Re:WTF? (Score:5, Insightful)

    by CastIronStove ( 2602755 ) on Thursday April 03, 2014 @11:42AM (#46649797)

    Instantly, since all possible combinations will occur simultaneously.

  • Any Excuse? Yes. (Score:5, Insightful)

    by holophrastic ( 221104 ) on Thursday April 03, 2014 @11:43AM (#46649805)

    Security isn't about safety. The vast majority of passwords are for identification, rather than security. And the ones that are for security, are for a "reasonable" amount of security. The biggest point is to make breaking it an obviously-intentional exercise -- because that can be made illegal. It's not about stopping criminals. It's about defining criminals.

    So go ahead and make your twitter account password super-secure so that no one can ever hack in. And then go home to your cylinder lock, easily pickable, next to the big glass window. Then tell us how safe you are -- remembering that whether or not you keep your twitter password on a sticky note, and whether or not your desktop e-mail is accessible within your home without a password, your children and your wife, and your dog are sleeping behind not such password.

    And any locksmith can break into any car, as a ten-second paid-for emergency service. And so can anyone who's watched them do it.

    Stop trying to feel safe. Just feel safe. It's a lot easier, cheaper, and much more valid.

    Did you leave your oven on?

  • Re:WTF? (Score:5, Insightful)

    by Chris Mattern ( 191822 ) on Thursday April 03, 2014 @11:56AM (#46649993)

    So if someone has a 6 character password (which is dumb) you can just try all possible passwords (there isn't that many possible 6 realistic character passwords).

    No, it doesn't work that way; that's the whole point. If you have the hash and are trying to compare against it, you can't just try all the possible passwords because if haven't cracked the other passwords you don't know how to produce the hash that corresponds to a given password. If you're just trying passwords at a login prompt, brute force is trivial to defeat (best method will most likely be simply imposing an increasing login delay with each wrong attempt).

  • Re:Clarification (Score:4, Insightful)

    by MarcoAtWork ( 28889 ) on Thursday April 03, 2014 @12:03PM (#46650081)

    why would you need multiple people assigned to this job? seems to me if you are really concerned you could 'prime' this system by using an attached HSM with however many random accounts/passwords you'd like to be logged in at bootup: outside of somebody physically breaking into your server room and stealing your keycard it would seem quite secure to me...

  • Re:WTF? (Score:0, Insightful)

    by Anonymous Coward on Thursday April 03, 2014 @12:20PM (#46650269)

    What is to stop an infinite number of monkeys from all typing the same thing?

  • Re:WTF? (Score:5, Insightful)

    by Anonymous Coward on Thursday April 03, 2014 @12:33PM (#46650431)

    Even if all of them typed the same thing the rest of them would type the other combinations.

  • Re:WTF? (Score:4, Insightful)

    by Cenan ( 1892902 ) on Thursday April 03, 2014 @02:02PM (#46651435)

    Hook the keyboards up in parallel and combine all the inputs to produce infinite outputs and you get instant monkey cracking. Thought now you're stuck with infinite monkeys with nothing to do.

  • Re:WTF? (Score:3, Insightful)

    by Cenan ( 1892902 ) on Thursday April 03, 2014 @02:06PM (#46651457)

    There is nothing to suggest that an infinite amount of monkeys wont produce an infinite amount of "a"s. Adding more monkeys could produce more "a"s.

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...