HPAKE

Honey Password-authenticated Key Exchange for Fast and Safer Online Authentication

Journal Article (2023)
Author(s)

Wenting Li (Peking University)

Ping Wang (National Engineering Research Center for Software Engineering)

K. Liang (TU Delft - Cyber Security)

Research Group
Cyber Security
Copyright
© 2023 Wenting Li, Ping Wang, K. Liang
DOI related publication
https://doi.org/10.1109/TIFS.2022.3214729
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 Wenting Li, Ping Wang, K. Liang
Research Group
Cyber Security
Volume number
18
Pages (from-to)
1596-1609
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may deliberately steal the passwords or inadvertently leak the passwords. So far, there are two main techniques to address the leakage: Augmented password-authentication key exchange (aPAKE) against insiders and honeyword technique for external attackers. But none of them can resist both attacks. To fill the gap, we propose the notion of <italic>honey PAKE (HPAKE)</italic> that allows the authentication server to detect the password leakage and achieve the security beyond the traditional bound of aPAKE. Further, we build an HPAKE construction on the top of the honeyword mechanism, honey encryption, and OPAQUE which is a standardized aPAKE. We formally analyze the security of our design, achieving the insider resistance and the password breach detection. We implement our design and deploy it in the real environment. The experimental results show that our protocol only costs 71.27 ms for one complete run, within 20.67 ms on computation and 50.6 ms on communication. This means our design is secure and practical for real-world applications.

Files

HPAKE_Honey_Password_Authentic... (pdf)
(pdf | 2.08 Mb)
- Embargo expired in 24-08-2023
License info not available