Passwords Flashcards
1
Q
Password Storage forms(3)
A
- Plaintext(bad)
- Encrypted(fair)
- Hashed(good)
2
Q
Password related techniques(4)
A
- Password storage forms
- Password policies
- Salting passwords
- Alternative password forms
3
Q
Types of passwords(4)
A
- Passphrases: user enters long phrases/sentences that are hashed to become passwords
- One Time Passwords
- Visual Passwords
- Picture Passwords
4
Q
One way functions properties and example
A
- ensures password security
- easy to compute and hard to reverse
eg. hash functions: input of arbitrary length produces output of fixed length
5
Q
Hash functions properties(2 general)
A
- Preimage resistance: given hash value y, computationally infeasible to calculate x where H(x)=y
- Collision resistance: computationally infeasible to find pair(x,y) where x!=y and H(x) = h(Y)
6
Q
Hash functions examples for crypto and password hashing(2 each)
A
crypto: SHA256, KECCAK
password hashing: ARGON2, bcrypt
7
Q
Plaintext password and 1 -ve
A
claimant password checked against password DB
-ve: No protection against attacker, dispute over real user
8
Q
Hashed passwords
A
- only hashed password stored
- claimant password gets hashed and checked against hashed password DB
- protection against hacker
9
Q
Attack on passwords(2)
A
- Offline Guessing Attacks
- Exhaustive attacks
- Dictionary attacks - Phishing and Spoofing
10
Q
Offline Guessing attack overview + why it is a threat + 3 incidents
A
- attacker gets hashed password and attempts to guess passwords
- threat if user uses same passwords for different accounts and due to server hacks or traffic sniffing
- password incidents: SingHealth breach,Adobe breach, Linkedin password leaked
11
Q
- Brute force attack + Solution
A
- guess password by going through passwords and hashes to check for match
Sol: Increase space of possible passwords, measured with password entropy 2^k
12
Q
Password entropy for dummies
A
2^k = (number of character types)^length of password
13
Q
- Dictionary Attack
A
- can attack hashed passwords
- exploit weakness in human picked passwords based on words in natural languages
- same password has same hash value
1. Guess commonly used passwords
2. Compute hash values
3. Look for same hash value in password file - sped up with precomputed hash table
- cheap to crack passwords due to high speed hardware and cloud services
- Strong password: modern hashing algo + hashing best practices
14
Q
Pre computed hash table
A
- contains password and their hashes
- with n bits and k password possibilities, table is size k x n
- NOT practical if k is large(ideal)
15
Q
Password salting
A
- prevents precomputed hashes being effective
- salt(random string) added to password before applying hash function
- diff salt => diff hashes
- salt of n bit: needs 2^n hashes for same password