GOTCHA Scheme Could Foil Growing Problem of Automated Brute Force Attacks
Carnegie Mellon University computer scientists have developed a new password system that incorporates inkblots to provide an extra measure of protection when, as so often occurs, lists of passwords get stolen from websites.
This new type of password, dubbed a GOTCHA (Generating panOptic Turing Tests to Tell Computers and Humans Apart), would be suitable for protecting high-value accounts, such as bank accounts, medical records and other sensitive information.
To create a GOTCHA, a user chooses a password and a computer then generates several random, multi-colored inkblots. The user describes each inkblot with a text phrase. These phrases are then stored in a random order along with the password. When the user returns to the site and signs in with the password, the inkblots are displayed again along with the list of descriptive phrases; the user then matches each phrase with the appropriate inkblot.
“These are puzzles that are easy for a human to solve, but hard for a computer to solve, even if it has the random bits used to generate the puzzle,” said Jeremiah Blocki, a Ph.D. student in computer science who developed GOTCHAs along with Manuel Blum, professor of computer science, and Anupam Datta, associate professor of computer science and electrical and computer engineering.
These puzzles would prove significant when security breaches of websites result in the loss of millions of user passwords – a common occurrence that has plagued such companies as LinkedIn, Sony and Gawker. These passwords are stored as cryptographic hash functions, in which passwords of any length are converted into strings of bits of uniform length. A thief can’t readily decipher these hashes, but can mount what’s called an automated offline dictionary attack. Computers today can evaluate as many as 250 million possible hash values every second, Blocki noted.
Given the continued popularity of easy passwords, such as “123456” or “password,” it’s not always difficult to crack these hashes. But even hard passwords are vulnerable to the latest brute force methods, Blocki said.
In the case of a GOTCHA, however, a computer program alone wouldn’t be enough to break into an account.
“To crack the user’s password offline, the adversary must simultaneously guess the user’s password and the answer to the corresponding puzzle,” Datta said. “A computer can’t do that alone. And if the computer must constantly interact with a human to solve the puzzle, it no longer can bring its brute force to bear to crack hashes.”
The researchers described GOTCHAs at the Association for Computing Machinery’s Workshop on Artificial Intelligence and Security in Berlin, Germany, Nov. 4.
Because the user’s descriptive phrases for inkblots are stored, users don’t have to memorize their descriptions, but have to be able to pick them out from a list. To see if people could do this reliably, the researchers performed a user study with 70 people hired through Mechanical Turk. First, each user was asked to describe 10 inkblots with creative titles, such as “evil clown” or “lady with poofy dress.” Ten days later, they were asked to match those titles with the inkblots. Of the 58 participants who participated in the second round of testing, one-third correctly matched all of the inkblots and more than two-thirds got half right.
Blocki said the design of the user study, including financial incentives that were too low, might account for the less-than-stellar performance. But he said there also are ways to make descriptions more memorable. One way would be to use more elaborate stories, such as “a happy guy on the ground protecting himself from ticklers.”
Go deeper with Bing News on:
- Movies Anywhere: Stealing Defeat From The Jaws of Victoryon March 20, 2020 at 8:27 am
However, there are a number of gotchas that Movies Anywhere spells out. Beyond the obvious limited catalog of supported movies, due to licensing issues that persist in this space, some addition ...
- React Hooks — Gotchason March 16, 2020 at 6:57 am
If not careful, they do also introduce a few gotchas you must look out for. Hooks may depend on props. These are called hook dependencies. Whenever a dependency changes, the hook is recalculated ...
- The CCA energy supply optionon March 13, 2020 at 10:27 am
The quantity of kilowatt-hours purchased is clearly a leading factor. Because households are a low priority, they receive lower-quality contracts fraught with rate pass-throughs and “gotchas.” If the ...
- Innovative security app shows your Facebook, Google and Twitter privacy gotchason March 12, 2020 at 2:03 pm
Jumbo is an app that takes care of all your social media security concerns. It reveals all those hidden privacy gotchas for sites like Twitter and Facebook.
- DAVE RAMSEY EXTRA: 5 Gotchas to Budget for this Holiday Seasonon March 2, 2020 at 4:00 pm
One of the biggest problems with Christmas is how it moves around on the schedule every year. You never know when it’s going to be, when it might be coming, and then BOOM! There it is at your fr ...
Go deeper with Google Headlines on:
Go deeper with Bing News on:
New password system
- TWW Introduces Online System to Help Customers Manage Their Accountson March 24, 2020 at 10:23 am
TRENTON — Trenton Water Works today announced a new online service that enables its customers to more conveniently ... Customers can establish an ongoing account by using their e-mail address and ...
- New University Heights Technology Advisory Committee seeks to solve city’s IT problemson March 24, 2020 at 7:04 am
“City Hall’s (computer) firewall had been breached, the password did not work, the installer could not be identified or found ... To help find those answers, Brennan has assembled a new Technology ...
- How to bypass Apple’s multi-device two-factor system with Messages auto-fillon March 24, 2020 at 5:22 am
This two-part system has you enter a password and then enter a code that’s available from all devices associated ... read our super FAQ to see if your question is covered. If not, we’re always looking ...
- Why Your Biometrics Are Your Best Passwordon March 23, 2020 at 8:30 am
The Alliance has introduced a new Universal Server certification for servers that interoperate ... FIDO2 architecture authenticates every account requesting access to resources on a secured system: ...
- Malicious New Coronavirus Extortion: ‘Nasty Tactic’ Threatens ‘To Infect Your Family’on March 20, 2020 at 11:46 pm
With millions of so-called threatening sextortion emails doing the rounds, there’s a good chance you will receive one if you haven’t already. The pattern is the same. You have been compromised ...