11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7. Authentication and Authorizationprovider. One of the benefits over OpenID and Face<strong>book</strong> Connect is that theidentity provider (e-mail provider) does not find out which web service theuser is trying to use. On the other hand, while the identity provider does notlearn the relaying party, the relaying party learns the user’s identity on theidentity provider’s service; i.e., his e-mail address. PseudoID [152] employsblind cryptographic signatures to eliminate this privacy concern. Moreover,while Face<strong>book</strong> Connect and Google Login associate the user with a socialprofile and may share some of that information with the third-party webservice, BrowserID does not. While BrowserID and Face<strong>book</strong> Connect seemto eliminate the need for web services to maintain and manage the securityc<strong>red</strong>entials for their users, they also present single points of failure that, ifabused could result in domino-like security failures. For instance, a user whohas enabled Face<strong>book</strong> Connect to log in to a plethora of web services, he onlyneeds to manage the Face<strong>book</strong> password. However, if the same passwordis also used for another service that does not support Face<strong>book</strong> Connect, apotential leak from either Face<strong>book</strong> or that service could allow an attackeraccess to all the services connected to that user’s Face<strong>book</strong> identity. Anotherexample, is the case where security flaws in the single-sign-on system enablean attacker to access the victim’s account in any of the services supportingsuch password-less login [391].7.5.2 Password CrackingPassword cracking is not a new technique [344]. However, up until recently,the use of cryptographic hash functions in the way authentication informationwas handled by services appea<strong>red</strong> as an effective defense. This is no longerthe case since modern CPUs/GPUs [60] can be combined to form powerfulcracking platforms targeting password digests. Many of them, such as Cloud-Cracker, are provided as an off-the-shelf paid service for the average user [9].Even if strong cryptographic hash functions are used for keeping passwordssafe, other properties of the system may be exploited to boost the processof cracking [12]. Research efforts have been directed towards suggestingharder-to-guess passwords and pass-phrases [234, 322, 396].7.5.3 Adaptive HashingAdaptive cryptographic hash functions, such as bcrypt [323] and scrypt [313],have been proposed to address the increasing ease with which passwordhashes can be cracked. These hash functions can adapt to hardware evolution,by deliberately wasting resources - either computational or memory - duringa hash validation. By employing such hash functions, a web site can slowdown an attacker sufficiently in cracking a particular user password. However,this also requires that the service invests additional resources into generating56

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!