skip to main content
10.1145/3290480.3290501acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network

Authors Info & Claims
Published:02 November 2018Publication History

ABSTRACT

Identity authentication is an important line of defense for network security, and passwords are still the mainstream of identity authentication. Password attacking is an important means of password security research. Probabilistic context-free grammar (PCFG) is the most effective password structure partitioning method at present. The string generation method based on neural network has powerful generalization ability. They effectively characterize the passwords on the substructure level and the character level respectively. In this paper, based on the merits of the above two models, we propose a password attacking method based on structure partition and bidirectional long short-term memory (BiLSTM) recurrent neural network, which is denoted as SPRNN model. Firstly, passwords are divided into abstract substructures. Then substrings of characters, digits and symbols in substructures are generated by using BiLSTM model to take account of the accuracy and generalization ability of the model. Finally, the method is verified by experiment on six real Chinese and English password datasets. The results show that in the context of a fixed number of guessing trials, the SPRNN model breaks the password 25% -30% more than Narayanan's method, about 10% than Weir et al.'s method password between the cross datasets.

References

  1. Wang Ping, Wang Ding, Huang Xin-Yi. 2016. Advances in Password Security. Computer Research and Development, 53(10): 2173--2188.Google ScholarGoogle Scholar
  2. Chen T Y, Lee C C, Hwang M S, et al. 2013. Towards secure and efficient user authentication scheme using smart card for multi-server environments. Journal of Supercomputing, 66(2):1008--1032. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Stajano F, Oorschot P C V, Herley C, et al. The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In proceedings of the 33th IEEE Symposium on Security and Privacy(San Francisco, USA, 2012), 553--567. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bonneau J, Herley C, Oorschot P C V, et al. 2015. Passwords and the evolution of imperfect authentication. Communications of the ACM, 58(7):78--87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Oechslin P. 2003. Making a Faster Cryptanalytic Ttime-Memory Trade-Off. Lecture Notes in Computer Science, 2729(4):617--630.Google ScholarGoogle ScholarCross RefCross Ref
  6. Narayanan A, Shmatikov V. Fast dictionary attacks on passwords using time-space trade off. In proceedings of the 12th ACM conference on Computer and communications security(Alexander, USA, 2005), 364--372. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Weir M, Aggarwal S, Medeiros B D, et al. Password cracking using probabilistic context-free grammars. In proceedings of the 30th IEEE Symposium on Security and Privacy( Washington, USA, 2009), 391--405. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Houshmand S, Aggarwal S, Flood R. 2017. Next Gen PCFG Password Cracking. IEEE Transactions on Information Forensics & Security, 10(8):1776--1791.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Wang D, Zhang Z J, Wang P, et al. Targeted online password guessing: an underestimated threat. In proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(Vienna, Austria, 2016), 1242--1254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Melicher W, Ur B, Segreti S.M, et al. Fast, Lean, and accurate: modeling password guessability using neural networks. In proceedings of USENIX Security Symposium(Austin, TX, USA, 2016), 175--191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hitaj B, Gasti P, Ateniese G. (2017). Passgan: a deep learning approach for password guessing. arXiv preprint arXiv:1709.00440.Google ScholarGoogle Scholar

Index Terms

  1. A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCNS '18: Proceedings of the 8th International Conference on Communication and Network Security
      November 2018
      166 pages
      ISBN:9781450365673
      DOI:10.1145/3290480

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 November 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader