On the Implications of Zipf's Law in Passwords

被引:47
|
作者
Wang, Ding [1 ]
Wang, Ping [1 ,2 ]
机构
[1] Peking Univ, Sch EECS, Beijing 100871, Peoples R China
[2] Peking Univ, Sch Software & Microelect, Beijing 100260, Peoples R China
来源
关键词
AUTHENTICATION; EFFICIENT;
D O I
10.1007/978-3-319-45744-4_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Textual passwords are perhaps the most prevalent mechanism for access control over the Internet. Despite the fact that human-beings generally select passwords in a highly skewed way, it has long been assumed in the password research literature that users choose passwords randomly and uniformly. This is partly because it is easy to derive concrete (numerical) security results under the uniform assumption, and partly because we do not know what's the exact distribution of passwords if we do not make a uniform assumption. Fortunately, researchers recently reveal that user-chosen passwords generally follow the Zipf's law, a distribution which is vastly different from the uniform one. In this work, we explore a number of foundational security implications of the Zipf-distribution assumption about passwords. Firstly, we how the attacker's advantages against password-based cryptographic protocols (e.g., authentication, encryption, signature and secret share) can be 2-4 orders of magnitude more accurately captured (formulated) than existing formulation results. As password protocols are the most widely used cryptographic protocols, our new formulation is of practical significance. Secondly, we provide new insights into popularity-based password creation policies and point out that, under the current, widely recommended security parameters, usability will be largely impaired. Thirdly, we show that the well-known password strength metric a-guesswork, which was believed to be parametric, is actually non-parametric in two of four cases under the Zipf assumption. Particularly, nine large-scale, real-world password datasets are employed to establish the practicality of our findings.
引用
收藏
页码:111 / 131
页数:21
相关论文
共 50 条
  • [1] Zipf's Law in Passwords
    Wang, Ding
    Cheng, Haibo
    Wang, Ping
    Huang, Xinyi
    Jian, Gaopeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2776 - 2791
  • [2] New Observations on Zipf's Law in Passwords
    Hou, Zhenduo
    Wang, Ding
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 517 - 532
  • [3] Zipf's law analysis on the leaked Iranian users' passwords
    Alebouyeh, Zeinab
    Bidgoly, Amir Jalaly
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (02) : 101 - 116
  • [4] Zipf’s law analysis on the leaked Iranian users’ passwords
    Zeinab Alebouyeh
    Amir Jalaly Bidgoly
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 101 - 116
  • [5] On Zipf's law and the bias of Zipf regressions
    Schluter, Christian
    EMPIRICAL ECONOMICS, 2021, 61 (02) : 529 - 548
  • [6] On Zipf’s law and the bias of Zipf regressions
    Christian Schluter
    Empirical Economics, 2021, 61 : 529 - 548
  • [7] Universality of Zipf's law
    Corominas-Murtra, Bernat
    Sole, Ricard V.
    PHYSICAL REVIEW E, 2010, 82 (01):
  • [8] Unzipping Zipf's law
    Lestrade, Sander
    PLOS ONE, 2017, 12 (08):
  • [9] Zipf's law in percolation
    Watanabe, MS
    PHYSICAL REVIEW E, 1996, 53 (04) : 4187 - 4190
  • [10] Zipf's law in multifragmentation
    Campi, X
    Krivine, H
    PHYSICAL REVIEW C, 2005, 72 (05):