Download as pdf or txt
Download as pdf or txt
You are on page 1of 77

Password Security and

Password Hygiene
Somitra Sanadhya
IIT Jodhpur
This set of slides were used for an invited talk in
National Cyber Security Awareness Month - Oct 2022.
1st Nov 2022
Today morning’s email to me
CERT-In : VPN Credentials of 4 users of IIT J are being
sold on dark web

We have verified the advisory and found it to be true.

Example:

User1: email_id = xyz.1 password = xyz.1234


Credits

Bollywood, Serials, Web-series: for memes used in this


talk

Internet: For some pictures in the slides

News Articles: For security incidents referred


Aim of the talk

Intended for general audience

NOT intended to be technical … & mostly remains so

Emphasis is on “Cybersecurity Awareness”


Anonymity on the internet

Image source: The New Yorker

(c) Peter Steiner

July 5, 1993
Authentication

“The act of proving the


identity of a computer
system or a user”
- wikipedia
Authentication failures lead to
Cybercrime
Criminals use this lack of authentication to fool people into
believing fake identities

Emails, Facebook messages, Bank SMS, …

This talk focuses on some aspects of protecting you


How to prove who are you?
Method 1:

What do you have?

Method used by smugglers


in Hindi movies in the 80’s
and 90’s
How to prove who are you?
Method 2:

Who are you?

Shreedevi, Nagina, 1986 Handprint, Thumbprint, …

Tom Cruise, Minority


Report, 2002
How to prove who are you?
Method 3:

What do you know?

Security questions

Passwords
Combining these methods

Money withdrawal from ATM: Card + PIN

Travel: Ticket + document to prove identity


Passwords as authenticator
Easy to use

Most widely used method for online authentication

However, insecure when used poorly

We discuss what are these poor usage, and why so


Password based login
Short or “easy” passwords
Everyone tells users not to use short passwords
But users …
Too easy to guess

“Shoulder surfing” attacks


How does password get stored at
the ser ver ?

Suppose the password gets stored as it is.

Then a database leak leads to leakage of everyone’s


password
Source: ZDNet.com Sept 26, 2012
Storing passwords
Do not store passwords directly

Store a value derived from the passwords


Stolen database

If the database gets leaked, the passwords are still safe.

Because the server only had “hashed passwords”.


Source: IndianExpress.com
May 19. 2017
Preventing (ser ver-side)
brute-forcing of passwords

May lead to Denial of Service (DoS) attacks


Preventing (ser ver-side)
brute-forcing of passwords

Audio, Text, … Captcha.


Maybe difficult for people with disabilities or old-age
CAPTCHA’s don’t even work

Youtube Course project report: Stanford, 2017


“Strong” passwords
“Strong” passwords
At least 8, but better be 12 to 15, characters long

Do not use consecutive keywords, or dictionary words

Use the entire keyboard

Do not use personally identifiable information in the


password (child’s name, DoB, car number, …)
Caveat:
Assumption that the
attacker is using a
standard computer
“Strong” passwords
Generating strong passwords
(1) Generate using a passphrase

Example:

Phrase: I first went to Disneyland when I was 8 years


old and it made me happy

Password: I1st w2DLwIw8yrso&immH


Example taken from: https://cybernews.com/best-password-managers/how-to-create-a-strong-password/
Generating strong passwords …

(2) Generate using multiple dictionary words

Example:

Words: Jigsaw, quest, trait, fork

Password: Jigsaw%Quest7trait/fork48

Example taken from: https://cybernews.com/best-password-managers/how-to-create-a-strong-password/


Multiple websites and ser vices
Same password everywhere?

If the information leaks from one place, it gets leaked


from everywhere

Imagine losing money from your bank, just because your


song streaming app leaked your data

Hence, Different passwords are needed for different accounts


Same password everywhere?
Same password everywhere?
What if you forget passwords too
frequently?
“Reset password” attacks
Solution

Use Multi-Factor Authentication (MFA) wherever


possible.

Use phone based app, or SMS, offline codes, or another


device to confirm login or password reset.
Generation Gap

Source: Google sur vey,


December 2018
Post-it passwords

Luiz Dorea, Head, International cooperation, Brazil Federal Police


At an event promoting the security of Soccer world cup final,
Brazil 2014
Post-it passwords …

Hawai emergency agency 2018

Missile alert warning (possibly linked to the password leakage)


Periodic password change
Periodic password change
Good hygiene

Eric Griffin, (writer for PC Mag online)

“Passwords are like under wear. You should change them often
(okay, maybe not every day). Don’t share them. Don’t leave
them out for others to see (no sticky notes!). Oh, and they
should be sexy. Wait, sorry, I mean they should be mysterious.
In other words, make your password a total mystery to
others.”
So far …
Strong passwords

Different for each website/app/ser vice

Do not post the passwords where they are visible

Multi Factor Authentication

Change passwords periodically


Usability ?
Lock the account after 3 wrong
tries?
How do you know if your
password was breached?
Security engineer Troy Hunt has created a website which
tracks and collects data from known security breaches
Gap bet ween exploit and its use

Password database breaches may not be known for long


times

Historically, the gap bet ween a breach and its exploit has
been few months, on an average
How to realise that the DB has
been breached ?
Store fake account info in the database

If someone accesses those accounts, it is a good sign that


the database was breached
How to realise that the DB has
been breached ?

ACM CCS 2013


Generating and memorising
multiple strong passwords
Humans are bad at generating “random” passwords

Analysis of password breaches shows that most common


passwords are:

Password, 12345, qwerty, asdfg, …


US Military passwords

In June 2011, an attack against Booz Allen


(boozallen.com) leaked 90,000 US military passwords

22 of them were “123456” !

Similar numbers for many other common and weak


passwords.
Password managers
Password managers
Invest in a good password manager

They allow you to generate multiple strong


passwords,

Change them periodically, and

Keep you notified if any breach takes place on any


ser vice used by you
Password managers

Source: Google sur vey, Dec. 2018


Public Wi-Fi
Public wifi may be un-encrypted

Hackers may be listening to your communications

Including the passwords

Fun incidents in coffee shops are/were common


Public Wi-Fi …

NYTimes, 4 Aug 2021


Public Wi-Fi …
What if you think like this?
The reality …

Your data may be used for phishing attacks

And may be used against your friends and family

Your private information may get leaked


Single Sign On
Many sites allow you to login via your social media or
mail accounts

Very common these days.


Avoid Single Sign On

You are giving more information to these organisations


(they already know too much about you !)

If the main account gets compromised then all your


other accounts may also be under risk
Avoid saving password info in the
browser
Specially, if your computer is also used by others

Makes it easy for others to gain access to your login


credentials

Sometimes, the browsers have not stored the passwords


securely
Don’t fall for Phishing
One of the most common methods to gain access to your
accounts

Relies on human nature - we trust easily

Hence a human problem, less technical, more social

However, technology may make falling for phishing


harder
Don’t fall for Phishing
If a deal is too good to be true, it is usually so

Do not give your information to random websites,


salespeople in the mall, …

Don’t click shortened URL’s

Check links (and not the text of the link)

Essentially, develop a habit of distrust


Implementation issues

Passwords may be good, the algorithm may be good, but


the implementation may leak the password

Consider a timing leakage in an implementation of login


verification
Implementation issues …
if (password == saved_password) …. else …. ;

The way string comparison works in many programming


languages, it will leak the time when the comparison
failed

This allows for a byte-by-byte brute force to recover the


password
Implementation issues …

byte-by-byte brute force to


recover the password

Image source: https://www.sjoerdlangkemper.nl/2016/11/01/tenex-password-bug/

Password leak in Tenex Operating System, 2016


Lessons learned
Use strong passwords

Use different passwords for different ser vices and apps

May be, use password managers


Lessons learned …

Use Multi-factor authentication whenever possible

Do not share your passwords with anyone


Lessons learned …
Change passwords periodically

Avoid entering passwords on public computers or (unencrypted)


public wifi hotspots

Do not write down your password and stick the paper on your
computer (or near it)
Lessons learned …

Avoid saving passwords in browsers

Be aware of security pitfalls in the algorithm or its


implementation at the server side
The “method” of transforming
passwords at the ser ver
The method is known as “password hashing algorithm”

Industry uses bcrypt or scrypt

But slowly switching to stronger methods like


Argon2

Refer to Password Hashing Competition 2014-17


Our work on password hashing
With Dr. Sweta Mishra, Dr. Donghoon Chang, Arpan Jati,
we designed a Password hashing algorithm RIG

Available at: https://eprint.iacr.org/2015/009

Implementation available at: https://github.com/arpanj/


Rig
Your feelings right now …
More technical info …
Fun stuff
Standup comedy by Michael McIntyre:

https://www.youtube.com/watch?v=aHaBH4LqGsI

Standup comedy by Gaurav Gupta:

https://www.youtube.com/watch?v=8ZX86pVN-l4
(Caution: occasional use of inappropriate language)
somitra@iitj.ac.in
https://sites.google.com/view/somitra

You might also like