Fast password recovery attack: application to APOP

被引:0
|
作者
Fanbao Liu
Yi Liu
Tao Xie
Dengguo Feng
Yumeng Feng
机构
[1] National University of Defense Technology,School of Computer
[2] Beijing University of Technology,School of Computer
[3] National University of Defense Technology,The Center for Soft
[4] Chinese Academy of Sciences,Computing and Cryptology
来源
关键词
MD5; APOP; Challenge and response; Password recovery; Group satisfaction scheme;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we improve the password recovery attack to Authentication Post Office Protocol (APOP) from two aspects. First, we propose new tunnels to control more fixed bits of MD5 collision, hence, we can recover passwords with more characters, for example, as long as 43 characters can be recovered practically. Second, we propose a group satisfaction scheme, apply divide-and-conquer strategy and a new suitable MD5 collision attack, to greatly reduce the computational complexity in collision searching with high number of chosen bits. We propose a fast password recovery attack to application APOP in local that can recover a password with 11 characters in >1 min, recover a password with 31 characters extremely fast, about 6 min, and for 43 characters in practical time. These attacks truly simulate the practical password recovery attacks launched by malware in real life, and further confirm that the security of APOP is totally broken.
引用
收藏
页码:251 / 261
页数:10
相关论文
共 50 条
  • [21] FSDM: Fast Recovery Saturation Attack Detection and Mitigation Framework in SDN
    Huang, Xuanbo
    Xue, Kaiping
    Xing, Yitao
    Hu, Dingwen
    Li, Ruidong
    Sun, Qibin
    2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 329 - 337
  • [22] Client-Server Password Recovery
    Chmielewski, Lukasz
    Hoepman, Jaap-Henk
    van Rossum, Peter
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009, PT 2, 2009, 5871 : 861 - 878
  • [23] Securing Password Recovery through Dispersion
    Jajodia, Sushil
    Litwin, Witold
    Schwarz, Thomas S. J.
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 228 - 233
  • [24] Augmenting password recovery with online profiling
    Al-Wehaibi, Khawla
    Storer, Tim
    Glisson, William Bradley
    DIGITAL INVESTIGATION, 2011, 8 : S25 - S33
  • [25] Password Recovery Using MPI and CUDA
    Apostal, David
    Foerster, Kyle
    Chatterjee, Amrita
    Desell, Travis
    2012 19TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING (HIPC), 2012,
  • [26] Password recovery using set reconciliation
    Fu, Bo
    Duan, Guiduo
    Li, Jianping
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 527 - 530
  • [27] Password Recovery Using Graphical Method
    Kharudin, Wafa' Mohd
    Din, Nur Fatehah Md
    Jali, Mohd Zalisham
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 11 - 20
  • [28] Web Password Recovery: A Necessary Evil?
    Al Maqbali, Fatma
    Mitchell, Chris J.
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 : 324 - 341
  • [29] Password Strength Metre Application
    Boonkrong S.
    Kitthimon A.
    Koksoungnoen P.
    Jenprakhon K.
    International Journal of Interactive Mobile Technologies, 2021, 15 (15) : 59 - 73
  • [30] Optimized Password Recovery for Encrypted RAR on GPUs
    An, Xiaojing
    Jia, Haipeng
    Zhang, Yunquan
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 591 - 598