Back to Search Start Over

Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information

Authors :
Salamatian, Salman
Huleihel, Wasim
Beirami, Ahmad
Cohen, Asaf
Médard, Muriel
Source :
IEEE Transactions on Information Forensics and Security, 15, 3749-3759 (2020)
Publication Year :
2020

Abstract

According to recent empirical studies, a majority of users have the same, or very similar, passwords across multiple password-secured online services. This practice can have disastrous consequences, as one password being compromised puts all the other accounts at much higher risk. Generally, an adversary may use any side-information he/she possesses about the user, be it demographic information, password reuse on a previously compromised account, or any other relevant information to devise a better brute-force strategy (so called targeted attack). In this work, we consider a distributed brute-force attack scenario in which $m$ adversaries, each observing some side information, attempt breaching a password secured system. We compare two strategies: an uncoordinated attack in which the adversaries query the system based on their own side-information until they find the correct password, and a fully coordinated attack in which the adversaries pool their side-information and query the system together. For passwords $\mathbf{X}$ of length $n$, generated independently and identically from a distribution $P_X$, we establish an asymptotic closed-form expression for the uncoordinated and coordinated strategies when the side-information $\mathbf{Y}_{(m)}$ are generated independently from passing $\mathbf{X}$ through a memoryless channel $P_{Y|X}$, as the length of the password $n$ goes to infinity. We illustrate our results for binary symmetric channels and binary erasure channels, two families of side-information channels which model password reuse. We demonstrate that two coordinated agents perform asymptotically better than any finite number of uncoordinated agents for these channels, meaning that sharing side-information is very valuable in distributed attacks.

Details

Database :
arXiv
Journal :
IEEE Transactions on Information Forensics and Security, 15, 3749-3759 (2020)
Publication Type :
Report
Accession number :
edsarx.2008.12823
Document Type :
Working Paper