On countering online dictionary attacks with login histories and humans-in-the-loop

  • Authors:
  • Paul C. Van Oorschot;Stuart Stubblebine

  • Affiliations:
  • Carleton University, Ottawa, Canada;Stubblebine Research Labs, New Jersey

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed in a login protocol by Pinkas and Sander (2002) to protect against online password-guessing attacks. We present modifications providing a new history-based login protocol with ATTs, which uses failed-login counts. Analysis indicates that the new protocol offers opportunities for improved security and user friendliness (fewer ATTs to legitimate users) and greater flexibility (e.g., allowing protocol parameter customization for particular situations and users). We also note that the Pinkas--Sander and other protocols involving ATTs are susceptible to minor variations of well-known middle-person attacks. We discuss complementary techniques to address such attacks, and to augment the security of the original protocol.