Fast password recovery attack: application to APOP

被引:0
|
作者
Fanbao Liu
Yi Liu
Tao Xie
Dengguo Feng
Yumeng Feng
机构
[1] National University of Defense Technology,School of Computer
[2] Beijing University of Technology,School of Computer
[3] National University of Defense Technology,The Center for Soft
[4] Chinese Academy of Sciences,Computing and Cryptology
来源
关键词
MD5; APOP; Challenge and response; Password recovery; Group satisfaction scheme;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we improve the password recovery attack to Authentication Post Office Protocol (APOP) from two aspects. First, we propose new tunnels to control more fixed bits of MD5 collision, hence, we can recover passwords with more characters, for example, as long as 43 characters can be recovered practically. Second, we propose a group satisfaction scheme, apply divide-and-conquer strategy and a new suitable MD5 collision attack, to greatly reduce the computational complexity in collision searching with high number of chosen bits. We propose a fast password recovery attack to application APOP in local that can recover a password with 11 characters in >1 min, recover a password with 31 characters extremely fast, about 6 min, and for 43 characters in practical time. These attacks truly simulate the practical password recovery attacks launched by malware in real life, and further confirm that the security of APOP is totally broken.
引用
收藏
页码:251 / 261
页数:10
相关论文
共 50 条
  • [31] A Secured Authentication Protocol Which Resist Password Reuse Attack
    Prajitha, M., V
    Rekha, P.
    George, Amrutha A.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [32] A Method of Password Attack Based on Structure Partition and String Reorganization
    Zhang M.-L.
    Zhang Q.-H.
    Liu W.-F.
    Hu X.-X.
    Wei J.-H.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 913 - 928
  • [33] Exploring Implicit Memory for Painless Password Recovery
    Denning, Tamara
    Bowers, Kevin
    van Dijk, Marten
    Juels, Ari
    29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2011, : 2615 - 2618
  • [34] Extended password key exchange protocols immune to dictionary attack
    Jablon, DP
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 248 - 255
  • [35] Extended password key exchange protocols immune to dictionary attack
    Integrity Sciences, Inc
    J Eng Appl Sci, (248-255):
  • [36] Reflection attack on a generalized key agreement and password authentication protocol
    Ku, WC
    Lee, HL
    Chen, CM
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (05) : 1386 - 1388
  • [37] Password Recovery Mechanism Based on Keystroke Dynamics
    Roy, Soumen
    Roy, Utpal
    Sinha, D. D.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 245 - 257
  • [38] Password Recovery for RAR Files Using CUDA
    Hu, Guang
    Ma, Jianhua
    Huang, Benxiong
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 486 - +
  • [39] UNVEILLING THE PASSWORD ENCRYPTION PROCESS UNDER WINDOWS A PRACTICAL ATTACK
    Oprea, Lucian
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2013, 14 : 317 - 327
  • [40] Repeating Toast Drawing Based Password Inference Attack Technique
    Ling Z.
    Yang Y.
    Liu R.-Z.
    Zhang Y.
    Jia K.
    Yang M.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (06): : 2047 - 2060