web.archive.org/web/20210809001012/https:/arxiv.org/abs/1905.13737

Preview meta tags from the web.archive.org website.

Linked Hostnames

1

Thumbnail

Search Engine Appearance

Google

https://web.archive.org/web/20210809001012/https:/arxiv.org/abs/1905.13737

Protocols for Checking Compromised Credentials

To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned (HIBP) and Google Password Checkup (GPC), have started providing APIs to check for breached passwords. We refer to such services as compromised credential checking (C3) services. We give the first formal description of C3 services, detailing different settings and operational requirements, and we give relevant threat models. One key security requirement is the secrecy of a user's passwords that are being checked. Current widely deployed C3 services have the user share a small prefix of a hash computed over the user's password. We provide a framework for empirically analyzing the leakage of such protocols, showing that in some contexts knowing the hash prefixes leads to a 12x increase in the efficacy of remote guessing attacks. We propose two new protocols that provide stronger protection for users' passwords, implement them, and show experimentally that they remain practical to deploy.



Bing

Protocols for Checking Compromised Credentials

https://web.archive.org/web/20210809001012/https:/arxiv.org/abs/1905.13737

To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned (HIBP) and Google Password Checkup (GPC), have started providing APIs to check for breached passwords. We refer to such services as compromised credential checking (C3) services. We give the first formal description of C3 services, detailing different settings and operational requirements, and we give relevant threat models. One key security requirement is the secrecy of a user's passwords that are being checked. Current widely deployed C3 services have the user share a small prefix of a hash computed over the user's password. We provide a framework for empirically analyzing the leakage of such protocols, showing that in some contexts knowing the hash prefixes leads to a 12x increase in the efficacy of remote guessing attacks. We propose two new protocols that provide stronger protection for users' passwords, implement them, and show experimentally that they remain practical to deploy.



DuckDuckGo

https://web.archive.org/web/20210809001012/https:/arxiv.org/abs/1905.13737

Protocols for Checking Compromised Credentials

To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned (HIBP) and Google Password Checkup (GPC), have started providing APIs to check for breached passwords. We refer to such services as compromised credential checking (C3) services. We give the first formal description of C3 services, detailing different settings and operational requirements, and we give relevant threat models. One key security requirement is the secrecy of a user's passwords that are being checked. Current widely deployed C3 services have the user share a small prefix of a hash computed over the user's password. We provide a framework for empirically analyzing the leakage of such protocols, showing that in some contexts knowing the hash prefixes leads to a 12x increase in the efficacy of remote guessing attacks. We propose two new protocols that provide stronger protection for users' passwords, implement them, and show experimentally that they remain practical to deploy.

  • General Meta Tags

    18
    • title
      [1905.13737] Protocols for Checking Compromised Credentials
    • title
      open search
    • title
      open navigation menu
    • title
      contact arXiv
    • title
      subscribe to arXiv mailings
  • Open Graph Meta Tags

    4
    • og:site_name
      arXiv.org
    • og:title
      Protocols for Checking Compromised Credentials
    • og:url
      https://web.archive.org/web/20210811072350/https://arxiv.org/abs/1905.13737v3
    • og:description
      To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned (HIBP) and Google Password Checkup (GPC), have started providing APIs to check for breached passwords. We refer to such services as compromised credential checking (C3) services. We give the first formal description of C3 services, detailing different settings and operational requirements, and we give relevant threat models. One key security requirement is the secrecy of a user's passwords that are being checked. Current widely deployed C3 services have the user share a small prefix of a hash computed over the user's password. We provide a framework for empirically analyzing the leakage of such protocols, showing that in some contexts knowing the hash prefixes leads to a 12x increase in the efficacy of remote guessing attacks. We propose two new protocols that provide stronger protection for users' passwords, implement them, and show experimentally that they remain practical to deploy.
  • Twitter Meta Tags

    6
    • twitter:site
      @arxiv
    • twitter:card
      summary
    • twitter:title
      Protocols for Checking Compromised Credentials
    • twitter:description
      To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned...
    • twitter:image
      https://web.archive.org/web/20210811072350im_/https://static.arxiv.org/icons/twitter/arxiv-logo-twitter-square.png
  • Link Tags

    8
    • shortcut icon
      https://web.archive.org/web/20210811072350im_/https://static.arxiv.org/static/browse/0.3.2.7/images/icons/favicon.ico
    • stylesheet
      https://web-static.archive.org/_static/css/banner-styles.css?v=1B2M2Y8A
    • stylesheet
      https://web-static.archive.org/_static/css/iconochive.css?v=1B2M2Y8A
    • stylesheet
      https://web.archive.org/web/20210811072350cs_/https://static.arxiv.org/static/browse/0.3.2.7/css/arXiv.css?v=20200727
    • stylesheet
      https://web.archive.org/web/20210811072350cs_/https://static.arxiv.org/static/browse/0.3.2.7/css/arXiv-print.css?v=20200611

Links

61