Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks

B. Kitts, Andrew Potter
{"title":"Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks","authors":"B. Kitts, Andrew Potter","doi":"10.1109/ISI.2019.8823381","DOIUrl":null,"url":null,"abstract":"Challenge Response is one of the cornerstones of online security. The simplest form of Challenge-Response is asking for a password. Much cryptographic work has focused on developing strong forms of encryption, however some networks require transmission over networks which might be monitored. We discuss this problem in the context of a particular kind of open network used by 30,000 users, and which is an important medium supporting emergency services. The current challenge-response implementation on this network relies upon sending information about the password. We calculate the number of observations needed to capture password using brute force attack, replay attack, and version spaces. We show that even strong passwords (completely random set of characters) are at significant risk of discovery in as few as 16 login attempts. We next present an algorithm that adds adversarial “chaff” to the password information designed to minimize relative information gain during challenge-response. We show that, with enough adversarial chaff, unambiguous password recovery from passive data capture may not be possible, although passwords can still be recovered by an attacker actively probing the system. Despite this, better protection of passwords is useful, and would be immediately helpful to people using these services.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2019.8823381","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Challenge Response is one of the cornerstones of online security. The simplest form of Challenge-Response is asking for a password. Much cryptographic work has focused on developing strong forms of encryption, however some networks require transmission over networks which might be monitored. We discuss this problem in the context of a particular kind of open network used by 30,000 users, and which is an important medium supporting emergency services. The current challenge-response implementation on this network relies upon sending information about the password. We calculate the number of observations needed to capture password using brute force attack, replay attack, and version spaces. We show that even strong passwords (completely random set of characters) are at significant risk of discovery in as few as 16 login attempts. We next present an algorithm that adds adversarial “chaff” to the password information designed to minimize relative information gain during challenge-response. We show that, with enough adversarial chaff, unambiguous password recovery from passive data capture may not be possible, although passwords can still be recovered by an attacker actively probing the system. Despite this, better protection of passwords is useful, and would be immediately helpful to people using these services.
不安全网络挑战-响应认证的高效对抗性箔条生成及其在民用无线网络中的应用
挑战响应是网络安全的基石之一。最简单的质询-响应形式是询问密码。许多密码学工作集中在开发强大的加密形式,然而一些网络需要在可能被监控的网络上传输。我们在一个特殊的30,000用户使用的开放网络的背景下讨论这个问题,这个网络是支持应急服务的重要媒介。当前该网络上的质询-响应实现依赖于发送有关密码的信息。我们计算了使用暴力攻击、重放攻击和版本空间捕获密码所需的观察次数。我们表明,即使是强密码(完全随机的字符集)在16次登录尝试中也有被发现的重大风险。接下来,我们提出了一种算法,该算法将对抗性“箔条”添加到密码信息中,旨在最大限度地减少挑战响应期间的相对信息增益。我们表明,如果有足够的对抗性干扰,从被动数据捕获中恢复明确的密码可能是不可能的,尽管攻击者仍然可以通过主动探测系统来恢复密码。尽管如此,更好地保护密码是有用的,并且会立即对使用这些服务的人有所帮助。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信