Page 96 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 96

Honeywords

            Honeywords are very similar to honeypots, a solution that allows the user to deceive criminals, making
            them  believe  that  they  are  attacking  the  real  system.  This  method  improves  the  security  of  hashed
            passwords as described by its authors: with the use of honeywords, an adversary who steals a file of
            hashed passwords and inverts the hash function cannot tell if he has found the password or a honeyword.

            In this sense, when an attacker obtains a password from a password cracking process, he gets the correct
            or fake password. At the time to authenticate onto the system, a notification is sent to the IT administrator
            every time a fake password is submitted. For this, there is a secondary server named honeychecker that
            validates true or false passwords. This server can be seen as an oracle and is isolated from the system
            improving thus a additional infrastructure resilience.



            How This Mechanism Works

            The user John Doe starts a register in the system with the password “cyberdefensemagazine2018”. At
            this moment, other password variants (honeywords) were also generated. The following information is
            created and stored.





              ID    |   Password representation (SHA1)
               1          233436af8122058f3b04599f12dcd1f1f7096b56 (cyberdefensemagazine2018)
               2          9017347a610d1436c1aaf52764e6578e8fc1a083 (cyber)
               3          66efd9eefecf45dd64eff8e5cb2d13e005041925 (2018)



            The user password is defined by the SHA1 hash key 233436af8122058f3b04599f12dcd1f1f7096b56. At
            time to brute-force password representations, the hash keys with the ID 2 and 3 are reversed quickly by
            the attacker, since them were generated via a weak password.

            Weaker passwords are broken faster than strong passwords because they have a smaller size and a
            weak complexity. For example, according to the group of honeywords defined in Figure 1, the 2018 or
            cyber  honeyword  is  quickly  broken  compared  to  the  original  password  picked  by  the  user
            (cyberdefensemagazine2018).






















                                 96
   91   92   93   94   95   96   97   98   99   100   101