Fast password recovery attack: application to APOP

被引:0
|
作者
Fanbao Liu
Yi Liu
Tao Xie
Dengguo Feng
Yumeng Feng
机构
[1] National University of Defense Technology,School of Computer
[2] Beijing University of Technology,School of Computer
[3] National University of Defense Technology,The Center for Soft
[4] Chinese Academy of Sciences,Computing and Cryptology
来源
关键词
MD5; APOP; Challenge and response; Password recovery; Group satisfaction scheme;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we improve the password recovery attack to Authentication Post Office Protocol (APOP) from two aspects. First, we propose new tunnels to control more fixed bits of MD5 collision, hence, we can recover passwords with more characters, for example, as long as 43 characters can be recovered practically. Second, we propose a group satisfaction scheme, apply divide-and-conquer strategy and a new suitable MD5 collision attack, to greatly reduce the computational complexity in collision searching with high number of chosen bits. We propose a fast password recovery attack to application APOP in local that can recover a password with 11 characters in >1 min, recover a password with 31 characters extremely fast, about 6 min, and for 43 characters in practical time. These attacks truly simulate the practical password recovery attacks launched by malware in real life, and further confirm that the security of APOP is totally broken.
引用
收藏
页码:251 / 261
页数:10
相关论文
共 50 条
  • [1] Fast password recovery attack: application to APOP
    Liu, Fanbao
    Liu, Yi
    Xie, Tao
    Feng, Dengguo
    Feng, Yumeng
    JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 251 - 261
  • [2] Security of MD5 challenge and response: Extension of APOP password recovery attack
    Sasaki, Yu
    Wang, Lei
    Ohta, Kazuo
    Kunihiro, Noboru
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 1 - +
  • [3] Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
    Sasaki, Yu
    Wang, Lei
    Ohta, Kazuo
    Kunihiro, Noboru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 96 - 104
  • [4] Bit-Free Collision: Application to APOP Attack
    Wang, Lei
    Sasaki, Yu
    Sakiyama, Kazuo
    Ohta, Kazuo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 3 - 21
  • [5] Password recovery attack to authentication post office protocol
    School of Computer, National University of Defense Technology, Changsha 410073, China
    不详
    Liu, F.-B. (liufanbao@gmail.com), 1927, Science Press (35):
  • [6] PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
    Braga, Daniel De Almeida
    Fouque, Pierre-Alain
    Sabt, Mohamed
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2497 - 2512
  • [7] Password recovery on challenge and response: Impossible differential attack on hash function
    Sasaki, Yu
    Wang, Lei
    Ohta, Kazuo
    Kunihiro, Noboru
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 290 - +
  • [8] A Key Recovery Attack on Chang-Chang Password Key Exchange Protocol
    Padmavathy, R.
    Bhagvati, Chakravarthy
    ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 176 - +
  • [9] The Password Reset MitM Attack
    Gelernter, Nethanel
    Kalma, Senia
    Magnezi, Bar
    Porcilan, Hen
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 251 - 267
  • [10] You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults
    Rao, Tingting
    Su, Yixin
    Xu, Peng
    Zheng, Yubo
    Wang, Wei
    Jin, Hai
    COMPUTER SECURITY - ESORICS 2023, PT III, 2024, 14346 : 141 - 161