Tuesday, March 4, 2014

New methods for password protection proposed


Researchers, including those of Indian-origin, have proposed a variety of innovative methods that can add a strong second layer of security to your password, protecting it from hackers.


Researchers from the University of Alabama at Birmingham, along with the University of California at Irvine, offered new options to increase password security against hacking.


"There have been many attacks on servers that store passwords lately, such as the breaches at PayPal and LinkedIn," said Nitesh Saxena, associate professor in the Department of Computer and Information Sciences at UAB.


Many people use the same few uncomplicated passwords repeatedly, making them easy to remember. Passwords are typically stored on servers in a hashed form.


Hackers can garner passwords either by an online brute-force attack, or by hacking a server with poor security and using a 'dictionary' of passwords to test offline.


Two-factor authentication schemes, such as Google Authenticator, or hardware tokens, such as RSA SecureID, use a second device to generate a temporary personal identification number, or PIN, that the user must enter along with their password.


But current two-factor schemes present the same vulnerabilities to server hacks as password-only authentication, Saxena said.


"If someone hacks into the server, they could learn the passwords via an offline dictionary attack," he said.


"Learning the passwords wouldn't compromise the second authentication factor, but the user might be using that same password elsewhere.


"The hacker might not be able to log into Facebook if Facebook uses two-factor authentication, but they could log into Twitter if Twitter uses the single-factor authentication using the same password," he said.


Researchers proposed and tested four two-factor schemes that require servers to store a randomised hash of the passwords and a second device, such as the user's security token or smartphone, to store a corresponding secret code.


They present these schemes at several levels of computer system bandwidth, effectively turning four schemes into 13 security options.


"Rather than requiring the user to enter both their password and a PIN generated by an app, the user could enter a password, and their smartphone could automatically send a PIN over a Bluetooth connection or through a simple QR code," Saxena said.


Saxena and his co-authors, UAB graduate student Maliheh Shirvanian, Stanislaw Jarecki and Naveen Nathan of the University of California at Irvine, have analysed each scheme in terms of security provided, usability and deployability.

No comments:

Post a Comment

Categories

3G 4G Aakash Acer Aircel Airtel Amazon Android OS Apple Laptop Apple News Applications Ashok Leyland Aston Martin Cars Asus Asus Laptop Audi Audi Car Bajaj Bikes Bing Bitcoin Black Berry BMW Bose Browser BSNL Camara Camera Canon Car Chevrolet Computer Cyber Crimes Data Card Datsun Dell Dot DRDO Dropbox Ducati Ericsson Facebook News Ferrari Fiat Cars Ford Cars Four Wheeler Fujifilm G-mail Gadget Game Gameloft Gatget Gionee GM Gmail Google News Google Tablet Google Watch Hangouts Harley-Davidson HCL HCL Laptop HCL Tablet Hero Bikes Honda Bikes Honda Car HP HP Laptop HP Smartphone HP Tablet HTC Mobile Huawei Hyundai Cars iBall IBM Idea Indian IT Information Information Infosys Inmobi Innovations Intel Internet Intex Mobiles Ipad iPhone Isuzu Motors IT Information Jaguar Cars Jeep Joint Venture Karbonn Mobile Karbonn Tab Kawasaki Bikes Lamborghini Car land rover Laptop Lava Lava Phone Lava Tablet Law Suit Lemon Mobile Lenovo Lenovo Laptop Lenovo Mobile Lenovo Tablet LG LG Mobile LG Televisions Linked in info Mahindra Mahindra Car Mahindra Tractor Malware Maruti Suzuki Maxx Mobile McAfee Mercedes Benz Micromax Mobile Micromax News Microsoft News Microsoft Websites Mitsubishi Mobile Mobile Networks Moschips Motorola Motorola Watch MTS New Technology Nexus NIIT Nikon Camera Nissan Nokia Mobile Oracle OS Other Tablet Panasonic Panasonic Mmobile Passport Phablet Philips Piaggio Play Station Quadricycle Range Rover Reliance Renault Renault Scala Robot Rolls Rolls Royce Salora Mobile Samsung Samsung Mobile Samsung News Samsung Tablet Sandisk Scooter Sistema Skoda Car Smart Watch Smartphone smoking Snapdeal Software Sony Sony Mobile spice SUV Suzuki T-Mobile Tablet Tata Docomo Tata Motors Toyota car TRAI TVS Twitter Two Wheeler Unilever Verizon Vespa Videocon Viper Vizio Vodafone Volkswagen Volvo Website Wechat Whatsapp Wickedleak Inc Wifi Wikipedia Windows 8 Windows News Windows Phone Wipro Xbox Xolo Mobile Xolo Tablet Xperia Yahoo Yahoo News Yamaha Bikes Zen Mobile ZTE Mobiles Zync Mobiles