• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

无密码泄露的密码强度计量器。

A Password Meter without Password Exposure.

机构信息

Advanced Software Research Center, Incheon National University, Incheon 22012, Korea.

ITM Programme, Department of Industrial Engineering, Seoul National University of Science and Technology, Seoul 01811, Korea.

出版信息

Sensors (Basel). 2021 Jan 6;21(2):345. doi: 10.3390/s21020345.

DOI:10.3390/s21020345
PMID:33419094
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7825399/
Abstract

To meet password selection criteria of a server, a user occasionally needs to provide multiple choices of password candidates to an on-line password meter, but such user-chosen candidates tend to be derived from the user's previous passwords-the meter may have a high chance to acquire information about a user's passwords employed for various purposes. A third party password metering service may worsen this threat. In this paper, we first explore a new on-line password meter concept that does not necessitate the exposure of user's passwords for evaluating user-chosen password candidates in the server side. Our basic idea is straightforward; to adapt fully homomorphic encryption (FHE) schemes to build such a system but its performance achievement is greatly challenging. Optimization techniques are necessary for performance achievement in practice. We employ various performance enhancement techniques and implement the NIST (National Institute of Standards and Technology) metering method as seminal work in this field. Our experiment results demonstrate that the running time of the proposed meter is around 60 s in a conventional desktop server, expecting better performance in high-end hardware, with an FHE scheme in HElib library where parameters support at least 80-bit security. We believe the proposed method can be further explored and used for a password metering in case that password secrecy is very important-the user's password candidates should not be exposed to the meter and also an internal mechanism of password metering should not be disclosed to users and any other third parties.

摘要

为了满足服务器的密码选择标准,用户偶尔需要向在线密码计量器提供多个密码候选,但此类用户选择的候选密码往往源自用户之前的密码——计量器很有可能获取到用户用于各种目的的密码信息。第三方密码计量服务可能会加剧这种威胁。在本文中,我们首先探索了一种新的在线密码计量器概念,该概念不需要在服务器端暴露用户的密码,即可评估用户选择的密码候选。我们的基本思路很直接;通过自适应全同态加密(FHE)方案来构建这样的系统,但其实践中的性能实现极具挑战性。需要优化技术才能实现性能。我们采用了各种性能增强技术,并实现了 NIST(美国国家标准与技术研究院)计量方法,作为该领域的开创性工作。我们的实验结果表明,所提出的计量器在传统桌面服务器上的运行时间约为 60 秒,在高端硬件上有望实现更好的性能,使用 HElib 库中的 FHE 方案,其参数支持至少 80 位的安全性。我们相信,在密码保密性非常重要的情况下,可以进一步探索和使用所提出的方法进行密码计量——用户的密码候选不应暴露给计量器,并且密码计量的内部机制也不应向用户和任何其他第三方公开。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/4371ca43f2c0/sensors-21-00345-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/43b9db28a581/sensors-21-00345-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/75aa0c135621/sensors-21-00345-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/2ce906e52fc1/sensors-21-00345-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/e2124400958f/sensors-21-00345-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/da33ecbe0804/sensors-21-00345-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/d995cf691cfc/sensors-21-00345-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/7942092ac885/sensors-21-00345-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/2eaf979ffb42/sensors-21-00345-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/838b0fd8911f/sensors-21-00345-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/0f1fd4fc7f96/sensors-21-00345-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/8281e6454617/sensors-21-00345-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/9307e41180af/sensors-21-00345-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/5d018fe70417/sensors-21-00345-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/4371ca43f2c0/sensors-21-00345-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/43b9db28a581/sensors-21-00345-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/75aa0c135621/sensors-21-00345-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/2ce906e52fc1/sensors-21-00345-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/e2124400958f/sensors-21-00345-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/da33ecbe0804/sensors-21-00345-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/d995cf691cfc/sensors-21-00345-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/7942092ac885/sensors-21-00345-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/2eaf979ffb42/sensors-21-00345-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/838b0fd8911f/sensors-21-00345-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/0f1fd4fc7f96/sensors-21-00345-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/8281e6454617/sensors-21-00345-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/9307e41180af/sensors-21-00345-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/5d018fe70417/sensors-21-00345-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e29/7825399/4371ca43f2c0/sensors-21-00345-g014.jpg

相似文献

1
A Password Meter without Password Exposure.无密码泄露的密码强度计量器。
Sensors (Basel). 2021 Jan 6;21(2):345. doi: 10.3390/s21020345.
2
A study on user authentication methodology using numeric password and fingerprint biometric information.使用数字密码和指纹生物识别信息的用户认证方法研究。
Biomed Res Int. 2013;2013:427542. doi: 10.1155/2013/427542. Epub 2013 Sep 17.
3
Security enhanced multi-factor biometric authentication scheme using bio-hash function.使用生物哈希函数的增强安全性多因素生物特征认证方案。
PLoS One. 2017 May 1;12(5):e0176250. doi: 10.1371/journal.pone.0176250. eCollection 2017.
4
Preventing shoulder-surfing attack with the concept of concealing the password objects' information.运用隐藏密码对象信息的概念来防止肩窥攻击。
ScientificWorldJournal. 2014;2014:838623. doi: 10.1155/2014/838623. Epub 2014 May 27.
5
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.一种基于安全动态身份和混沌映射的电子医疗保健系统用户认证与密钥协商方案
J Med Syst. 2016 Nov;40(11):233. doi: 10.1007/s10916-016-0586-2. Epub 2016 Sep 21.
6
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.用于基于网络的电子医疗保健应用的具有用户匿名性的安全高效双因素用户认证方案。
J Med Syst. 2016 Dec;40(12):268. doi: 10.1007/s10916-016-0629-8. Epub 2016 Oct 12.
7
Password authenticated key exchange-based on Kyber for mobile devices.
PeerJ Comput Sci. 2024 Mar 29;10:e1960. doi: 10.7717/peerj-cs.1960. eCollection 2024.
8
Siamese Neural Network for Keystroke Dynamics-Based Authentication on Partial Passwords.基于击键动力学的部分密码认证的连体神经网络
Sensors (Basel). 2023 Jul 26;23(15):6685. doi: 10.3390/s23156685.
9
A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication.一种基于多因素认证的高性能数据备份方案。
Entropy (Basel). 2024 Aug 5;26(8):667. doi: 10.3390/e26080667.
10
Recurrent GANs Password Cracker For IoT Password Security Enhancement.用于物联网密码安全增强的复发性 GAN 密码破解器。
Sensors (Basel). 2020 May 31;20(11):3106. doi: 10.3390/s20113106.

引用本文的文献

1
Toward secure mobile applications through proper authentication mechanisms.通过适当的认证机制实现安全的移动应用程序。
PLoS One. 2024 Dec 5;19(12):e0315201. doi: 10.1371/journal.pone.0315201. eCollection 2024.
2
Cognitive Based Authentication Protocol for Distributed Data and Web Technologies.基于认知的分布式数据和 Web 技术认证协议。
Sensors (Basel). 2021 Oct 31;21(21):7265. doi: 10.3390/s21217265.

本文引用的文献

1
Recurrent GANs Password Cracker For IoT Password Security Enhancement.用于物联网密码安全增强的复发性 GAN 密码破解器。
Sensors (Basel). 2020 May 31;20(11):3106. doi: 10.3390/s20113106.
2
Representation learning: a review and new perspectives.表示学习:综述与新视角。
IEEE Trans Pattern Anal Mach Intell. 2013 Aug;35(8):1798-828. doi: 10.1109/TPAMI.2013.50.
3
Long short-term memory.长短期记忆
Neural Comput. 1997 Nov 15;9(8):1735-80. doi: 10.1162/neco.1997.9.8.1735.