Murray Hazel, Malone David
Department of Mathematics and Statistics and the Hamilton Institute, Maynooth University, R51 A021 Co. Kildare, Ireland.
Entropy (Basel). 2020 Mar 26;22(4):378. doi: 10.3390/e22040378.
Password guessing is one of the most common methods an attacker will use for compromising end users. We often hear that passwords belonging to website users have been leaked and revealed to the public. These leaks compromise the users involved but also feed the wealth of knowledge attackers have about users' passwords. The more informed attackers are about password creation, the better their password guessing becomes. In this paper, we demonstrate using proofs of convergence and real-world password data that the vulnerability of users increases as a result of password leaks. We show that a leak that reveals the passwords of just 1% of the users provides an attacker with enough information to potentially have a success rate of over 84% when trying to compromise other users of the same website. For researchers, it is often difficult to quantify the effectiveness of guessing strategies, particularly when guessing different datasets. We construct a model of password guessing that can be used to offer visual comparisons and formulate theorems corresponding to guessing success.
密码猜测是攻击者用于危害终端用户的最常见方法之一。我们经常听说网站用户的密码被泄露并公开。这些泄露不仅会危及相关用户,还会增加攻击者对用户密码的了解。攻击者对密码创建了解得越多,他们的密码猜测能力就越强。在本文中,我们通过收敛性证明和真实世界的密码数据表明,密码泄露会导致用户的脆弱性增加。我们表明,仅泄露1%用户密码的一次泄露,就能为攻击者提供足够的信息,使其在试图危害同一网站的其他用户时,成功率可能超过84%。对于研究人员来说,往往很难量化猜测策略的有效性,尤其是在猜测不同数据集时。我们构建了一个密码猜测模型,可用于提供可视化比较,并制定与猜测成功相对应的定理。