neuroscience meets cryptography: implicit credential learning

26
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks http://betteryou.files.wordpress.com/2010/08/computer_brain_white.jpg Hristo Bojinov | Daniel Sanchez | Paul Reber | Dan Boneh | Patrick Lincoln

Upload: vanngoc

Post on 02-Jan-2017

220 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Neuroscience Meets Cryptography: Implicit Credential Learning

Neuroscience Meets Cryptography:Designing Crypto Primitives Secure

Against Rubber Hose Attacks

http://betteryou.files.wordpress.com/2010/08/computer_brain_white.jpg

Hristo Bojinov | Daniel Sanchez | Paul Reber | Dan Boneh | Patrick Lincoln

Page 2: Neuroscience Meets Cryptography: Implicit Credential Learning

rubber-hose cryptanalysis

Page 3: Neuroscience Meets Cryptography: Implicit Credential Learning

access to a secure facility

in-person authentication

Goal: Passwords that cannot be revealed consciously.

Page 4: Neuroscience Meets Cryptography: Implicit Credential Learning

human memory systems

declarative vs. procedural

procedural memory is "implicit"

Page 5: Neuroscience Meets Cryptography: Implicit Credential Learning

rubber hose-resistant passwords

teach the user a skill (in a game)

authenticate by measuring the skill

Page 6: Neuroscience Meets Cryptography: Implicit Credential Learning

guitar hero

Page 7: Neuroscience Meets Cryptography: Implicit Credential Learning

our authentication game

Page 8: Neuroscience Meets Cryptography: Implicit Credential Learning

our authentication game

Page 9: Neuroscience Meets Cryptography: Implicit Credential Learning

cost of training and authentication

training: 30-40 min

authentication: 5-10 min

Page 10: Neuroscience Meets Cryptography: Implicit Credential Learning

designing the game

Serial Interception Sequence Learning

user trains with a sequence

test: trained vs. unknown (% correct)

also test explicitly

Page 11: Neuroscience Meets Cryptography: Implicit Credential Learning

the key point

Users don't recognize their sequences in explicit tests.

"... When I played the tempo was so high it was incredibly difficult to keep a track of the circles. Most of the time my fingers moved by themselves, at least it felt that way. ..."

Page 12: Neuroscience Meets Cryptography: Implicit Credential Learning

recognition experiment

Page 13: Neuroscience Meets Cryptography: Implicit Credential Learning

sequences for authentication

uniform singe-character distribtion

uniform pair (bigram) distribution

6x5 = 30 characters in sequence

Page 14: Neuroscience Meets Cryptography: Implicit Credential Learning

counting the number of sequences

●Euler cycles●BEST theorem: 6^4 x 24^6●~37.8 bits of entropy

Page 15: Neuroscience Meets Cryptography: Implicit Credential Learning

skill acquisition and retention

immediate testsskill acquisition

delayed testsskill retention

Page 16: Neuroscience Meets Cryptography: Implicit Credential Learning

feasibility of profiling subsequences

skill expression (by fragment size) minimal expression for trigrams

need to further evaluate impact of fragment-based attacks (sizes 4+)

Page 17: Neuroscience Meets Cryptography: Implicit Credential Learning

reinventing psychology experiments

Amazon Mechanical Turk

large number of available subjects ~370 users in our experiments

getting results in hours

Page 18: Neuroscience Meets Cryptography: Implicit Credential Learning

experiment workflow

1 Accept HIT

code:

Page 19: Neuroscience Meets Cryptography: Implicit Credential Learning

experiment workflow

892670

1 Accept HIT

2 Get code

code:

Page 20: Neuroscience Meets Cryptography: Implicit Credential Learning

experiment workflow

892670

1 Accept HIT

2 Get code3 Enter code

code:

Page 21: Neuroscience Meets Cryptography: Implicit Credential Learning

approval workflow

reconcile 1b results1a submissions

user: A code: 123983user: B code: 340911user: C code: 900321user: D code: 691012...........

code: 123983 r: 1H 2H..code: 340911 r: 1W 2H..code: 900321 r: 1M 2M..code: 691012 r: 1W 2W.............

Page 22: Neuroscience Meets Cryptography: Implicit Credential Learning

approval workflow

reconcile 1b results1a submissions

user: A code: 123983user: B code: 340911user: C code: 900321user: D code: 691012...........

code: 123983 r: 1H 2H..code: 340911 r: 1W 2H..code: 900321 r: 1M 2M..code: 691012 r: 1W 2W.............

2 payment

vvvx

Page 23: Neuroscience Meets Cryptography: Implicit Credential Learning

abuse facts

we rejected ~5% of submissions

random or empty receipt

repetition of keys (automation?)

large stretches without user activity

Page 24: Neuroscience Meets Cryptography: Implicit Credential Learning

related work

Tamara Denning, Kevin D. Bowers, Marten van Dijk, Ari JuelsExploring implicit memory for painless password recovery (CHI 2011)

Daphna Weinshall, Scott KirkpartickPasswords you'll never forget, but can't recall(CHI 2004)

Keystroke timing work since the 1970sMouse movement analysis

Page 25: Neuroscience Meets Cryptography: Implicit Credential Learning

summary

implement challenge-response (provides eavesdropping resistance)

speed up authentication (EEG data?)

passwords that cannot be extracted (and can be changed!)

future work

Page 26: Neuroscience Meets Cryptography: Implicit Credential Learning

http://seclab.stanford.edu/[email protected]

or just google us... :-)