论文标题
集中式vs分散的目标蛮力攻击:用侧面信息猜测
Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information
论文作者
论文摘要
根据最近的实证研究,大多数用户在多个密码确定的在线服务中具有相同或非常相似的密码。这种做法可能会带来灾难性的后果,因为一个密码被妥协会使所有其他帐户面临更高的风险。通常,对手可以使用他/她对用户所拥有的任何副信息,无论是人口统计信息,先前折衷的帐户上的密码重复使用或任何其他相关信息来设计更好的蛮力策略(所谓的目标攻击)。在这项工作中,我们考虑了分布式的蛮力攻击方案,其中$ m $对手,每个观察一些侧面信息,尝试违反密码安全系统。我们比较了两种策略:一个不协调的攻击,在该攻击中,对手根据自己的侧面信息查询系统,直到找到正确的密码,而完全协调的攻击,对手在该攻击中汇总其侧面信息并将系统查询在一起。对于密码$ \ MATHBF {X} $长度$ n $的$,从分发$ p_x $中独立生成,我们为未协调和协调的策略建立了一个渐近闭合形式的表达式,当侧面信息$ \ mathbf {y} _} _ {(m)} $通过$ \ mathbf产生$ \ mathbf { $ p_ {y | x} $,因为密码的长度$ n $变为无限。我们说明了二进制对称频道和二进制擦除频道的结果,这是两个侧信息频道的家族,它们对密码重复使用进行了建模。我们证明,在这些渠道上,两种协调的代理在渐近上的表现要好于任何有限数量的未协同条件,这意味着共享侧信息在分布式攻击中非常有价值。
According to recent empirical studies, a majority of users have the same, or very similar, passwords across multiple password-secured online services. This practice can have disastrous consequences, as one password being compromised puts all the other accounts at much higher risk. Generally, an adversary may use any side-information he/she possesses about the user, be it demographic information, password reuse on a previously compromised account, or any other relevant information to devise a better brute-force strategy (so called targeted attack). In this work, we consider a distributed brute-force attack scenario in which $m$ adversaries, each observing some side information, attempt breaching a password secured system. We compare two strategies: an uncoordinated attack in which the adversaries query the system based on their own side-information until they find the correct password, and a fully coordinated attack in which the adversaries pool their side-information and query the system together. For passwords $\mathbf{X}$ of length $n$, generated independently and identically from a distribution $P_X$, we establish an asymptotic closed-form expression for the uncoordinated and coordinated strategies when the side-information $\mathbf{Y}_{(m)}$ are generated independently from passing $\mathbf{X}$ through a memoryless channel $P_{Y|X}$, as the length of the password $n$ goes to infinity. We illustrate our results for binary symmetric channels and binary erasure channels, two families of side-information channels which model password reuse. We demonstrate that two coordinated agents perform asymptotically better than any finite number of uncoordinated agents for these channels, meaning that sharing side-information is very valuable in distributed attacks.