Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Hemadri Rawat, Yamini Singh, Prof. Ashwini Kumar
DOI Link: https://doi.org/10.22214/ijraset.2023.56988
Certificate: View Certificate
Protecting passwords from hackers is a formidable challenge in the current technological landscape, given the myriad of tools available in the hacking domain. This paper delves into an exploration of various password types and lengths, highlighting those that are ill-advised for use. Additionally, it discusses password types that offer comparatively greater security and outlines prevalent cracking techniques employed by hackers. The document further outlines effective measures to enhance password security, incorporating algorithms designed for this purpose. Comprehensive coverage is provided on methods to safeguard passwords from potential attacks. Notably, the paper extends its scope to include insights into the various types of Wi-Fi passwords.
I. INTRODUCTION
In the realm of user authentication, a password serves as a crucial set of characters, verifying identity or granting access to confidential resources. However, storing passwords in plain text is a security risk due to cyber threats. To safeguard against such threats, various methods and concepts, including algorithms, are employed. Hashing, a specific algorithm, transforms data of any size into fixed-length data. Modern hashing algorithms, such as MD-5, SHA-1, SHA-2, and SHA-3, play a key role in securing passwords. Additionally, three recommended password hashing algorithms—PBKDF2, b-crypt, and s-crypt—add an extra layer of protection. Different methods of hacking, such as dictionary attacks, brute-force attacks, rainbow attacks, DOS attack, man in the middle attack, and birthday attack, pose a substantial threat by targeting passwords. This paper explores preventive measures against these threats, emphasizing the importance of creating secure passwords. In the present-day landscape, cyber security concerns have escalated, with various unauthorized access methods posing significant threats. The compromise of passwords without consent is especially perilous, exposing personal data to unauthorized individuals. Diverse threads of attacks include dictionary attack, brute force attack, rainbow attack, DOS attack, man in the middle attack and birthday attacks.
This paper delves into strategies for safeguarding passwords against the aforementioned threats. Recognizing the paramount importance of passwords in our daily lives, it emphasizes the necessity of fortifying them to ensure robust security.
II. PASSWORD CRACKING TECHNIQUES
Methods for cracking passwords encompass dictionary attacks, brute-force attacks, and rainbow attacks.Rainbow attacks leverage precomputed hashes for quick password cracking. It's crucial to implement preventive measures like salting passwords and using strong hashing algorithms to counter these techniques.
A. Dictionary Attack
Within the realm of cyber security, the dictionary attack emerges as a technique for unauthorized access to secured systems or accounts. This method systematically cross-references a predefined set of words, often drawn from dictionaries and encompassing commonly used passwords, with a password database. This database, presented as a text file, contains an array of dictionary words arranged in alphabetical order. The central objective of the attack is to efficiently identify matches between these dictionary words and the stored passwords. By leveraging users' tendencies to adopt easily predictable or commonly employed phrases as passwords, the dictionary attack exploits vulnerabilities associated with weak password choices. Consequently, this method poses a significant threat to overall security and is frequently employed by malicious entities seeking to compromise systems.
III. ALGORITHMS
Hashing constitutes an algorithmic process that transforms data of variable sizes into a fixed-length format. This technique is commonly employed to streamline data retrieval by condensing substantial amounts of information into a more manageable string for comparison. To illustrate, consider a DNA sample, which inherently comprises considerable data (approximately 2.2 – 3.5 MB). When seeking to identify the individual associated with this sample, comparing the full 2.2 MB against an entire database of DNA samples could be time-consuming, particularly when dealing with numerous samples. Hashing provides a practical solution in this scenario. Instead of directly comparing the data, the hash of the information is computed (accounting for various chromosomal locations). This process yields a fixed-length value, such as 128 bits, making it more efficient to query a database compared to the original 2.2 MB dataset.
A crucial distinction between hashing and encryption lies in reversibility. Unlike encryption, a hash is non-reversible. When discussing cryptographic hash functions, certain properties are essential:
Furthermore, a robust hash function should resist:
a. Collisions (occurrence of two different messages generating identical hashes).
b. Preimage resistance, making it challenging to find a message corresponding to a given hash.
c. Resistance to second-preimages, wherein it is infeasible to find a distinct message producing the same hash as a given message (e.g., MD-5(m) = MD-5(m’)).
IV. MODERN HASHING ALGORITHM
Some hashing algorithms you may encounter are:
The SHA family encompasses three distinct algorithms:
Despite SHA-1 being recognized as "cryptographically broken," the fundamental properties sought in a password hashing algorithm remain valid. In practical terms, if a password hashing algorithm built on SHA-1 is implemented securely, there is no immediate necessity to transition to a newer alternative.
V. HASHING PASSWORD ALGORITHMS
There are currently three secure algorithms for password hashing:
A. PBKDF2
PBKDF2 is primarily used for key derivation but is also suitable for password hashing due to its deliberate slowness. The resulting derived key (HMAC) can effectively secure passwords. Despite being slower, the choice of the underlying hashing algorithm, such as SHA-1 or SHA-2, is crucial. PBKDF2, when implemented with SHA-256 or SHA-512 on a 64-bit PC, provides enhanced security. It iterates the SHA-1-HMAC(password+salt) calculation 1024 times, introducing a significant delay. However, distributed systems or GPU-based attacks can still pose a threat.
A notable consideration is that when passwords exceed 64 bytes, PBKDF2 shortens them through a hash, potentially reducing security. Although, this reduction may not significantly impact key brute-force attempts.
B. bcrypt:
bcrypt is the prevailing standard for secure password hashing. Derived from the Blowfish block cipher, it employs memory-intensive lookup tables for hash generation. This memory requirement poses a challenge for GPU-based attacks, offering robust security. Having been extensively vetted over 14 years, bcrypt is considered a reliable choice. However, FPGA processing units could potentially exploit its weaknesses, especially for longer passwords.
C. Scrypt
Scrypt introduces a novel approach to password hashing by emphasizing operations challenging for anything other than a PC, specifically random memory accesses. Similar to bcrypt, it enhances security by increasing calculation time and memory space exponentially with additional rounds. Scrypt, developed in response to evolving attacks on bcrypt, surpasses GPU and FPGA constraints due to its memory-intensive nature. While relatively newer than bcrypt, Scrypt has proven effective in countering emerging threats.
It's important to note that these algorithms play a crucial role in protecting user passwords against various attacks.
VI. PASSWORD STRENGTH
Password strength is vital in thwarting attacks. Length, randomness, and complexity contribute to strong passwords. Preventive measures, including salting and iterative hashing, make brute-force and dictionary attacks computationally intensive, providing better security. A robust hashing algorithm with passwords comprising a minimum of eight randomly chosen characters is always a good practice. Humans, by nature, struggle to remember and generate truly random sequences. Consequently, users are mandated to craft passwords containing a combination of numbers, letters, symbols, and at least one capital letter. This stipulation plays a crucial role in the context of password hashing, where various attack strategies are employed:
A. Prevention from Attacks
B. Securing Account
Ensure that the passwords you create do not fall into these categories to fortify your digital security effectively.
While password security remains a challenge, implementing best practices, using robust hashing algorithms, and embracing alternative authentication methods contribute to a more secure digital environment. User awareness, adherence to secure practices, and continuous advancements in cybersecurity measures are crucial in mitigating evolving threats.
[1] https://www.researchgate.net/publication/236898951_A_Survey_of_Password_Attacks_and_Comparative_Analysis_on_Methods_for_Secure_Authentication [2] R. Morris and K. Thompson. “Password security: a case history” Communications. ACM, 22(11):594–597, 1979. [3] M. Weir, Using Probabilistic Techniques to aid in Password Cracking Attacks, Dissertation, Florida State University, 2010 [4] http://www.openwall.com/john/ [Online document] [5] T. Booth and R. Thompson, “Applying Probability Measures to Abstract Languages,” IEEE Transactions on Computers, Vol. C-22, No. 5, May 1973 [6] Yan, J.J., Blackwell, A., Anderson, R. and Grant, A., “The Memorability and Security of Passwords -- Some Empirical Results”, Technical Report No. 500 (September 2000) Computer Laboratory, University of Cambridge. [7] Notoatmodjo, Gilbert and Thomborson, Clark. Passwords and perceptions. [8] Proceedings of the Seventh Australasian Conference on Information Security – Volume 98 (AISC 2009, pages 71–78. Australian Computer Society, Jan 2009. [9] I. Ghafir, V. Prenosil, M. Hammoudeh, F. J. Aparicio-Navarro, K. Rabie and A. Jabban, “Disguised Executable Files in Spear-Phishing Emails: Detecting the Point of Entry in Advanced Persistent Threat.” International Conference on Future Networks and Distributed Systems. Amman, Jordan, 2018. [10] Miller, G.A. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol. Rev. 63(2), 81 (1956) [11] Malaysia, pp. 1-6, 2014. [12] I. Ghafir, M. Husak and V. Prenosil, “A Survey on Intrusion Detection and Prevention Systems,” IEEE/UREL conference, Zvule, Czech Republic, pp. 10-14, 2014. [13] Carstens, D.S., Malone, L.C., McCauley-Bell, P. Applying chunking theory in organizational password guidelines. 1, 97–113 (2006) [14] I. Ghafir, J. Svoboda and V. Prenosil, “Tor-based malware and Tor connection detection,” International Conference on Frontiers of Communications, Networks and Applications. Kuala Lumpur, [15] [13] Shirley Gaw, Edward W. Felten. Password Management Strategies for Online Accounts – Quantifying Password reuse, 2006 [16] Matt Bishop. COMPCON Spring \'91 Digest of Papers - Password management, 1 March 1991 [17] Bander AlFayyadh, Per Thorsheim, Audun Jøsang and Henning Klevjer, Improving Usability of Password Management with Standardized Password Policies 03 June 2014 [18] I. Ghafir and V. Prenosil, “Advanced Persistent Threat and Spear Phishing Emails.” International Conference Distance Learning, Simulation and Communication. Brno, Czech Republic, pp. 34-41, 2015.
Copyright © 2023 Hemadri Rawat, Yamini Singh, Prof. Ashwini Kumar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET56988
Publish Date : 2023-11-24
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here