Researchers use inkblots to improve security of online passwords
Pittsburgh: Computer scientists at Carnegie Mellon University have developed a new inkblot password system called GOTCHA to increase security against online password thefts.
The new password system incorporates inkblots to provide an extra measure of protection when, as so often occurs, lists of passwords get stolen from websites.
GOTCHA (Generating panOptic Turing Tests to Tell Computers and Humans Apart) would be suitable for protecting high-value accounts, such as bank accounts, medical records and other sensitive information.
To create a GOTCHA, a user chooses a password and a computer then generates several random, multi-colored inkblots.
The user describes each inkblot with a text phrase. These phrases are then stored in a random order along with the password.
When the user returns to the site and signs in with the password, the inkblots are displayed again along with the list of descriptive phrases; the user then matches each phrase with the appropriate inkblot.
"These are puzzles that are easy for a human to solve, but hard for a computer to solve, even if it has the random bits used to generate the puzzle," said Jeremiah Blocki, a Ph.D. student in computer science, who developed GOTCHAs along with Manuel Blum, professor of computer science, and Anupam Datta, associate professor of computer science and electrical and computer engineering.
These puzzles would prove significant when security breaches of websites result in the loss of millions of user passwords - a common occurrence that has plagued such companies as LinkedIn, Sony and Gawker.
These passwords are stored as cryptographic hash functions, in which passwords of any length are converted into strings of bits of uniform length.
A thief can`t readily decipher these hashes, but can mount what`s called an automated offline dictionary attack. Computers today can evaluate as many as 250 million possible hash values every second, Blocki noted.
Given the continued popularity of easy passwords, such as "123456" or "password," it`s not always difficult to crack these hashes. But even hard passwords are vulnerable to the latest brute force methods, Blocki said.
In the case of a GOTCHA, however, a computer program alone wouldn`t be enough to break into an account.
"To crack the user`s password offline, the adversary must simultaneously guess the user`s password and the answer to the corresponding puzzle," Datta said, adding: "A computer can`t do that alone. And if the computer must constantly interact with a human to solve the puzzle, it no longer can bring its brute force to bear to crack hashes."
Download the all new Zee News app for Android and iOS to stay up to date with latest headlines and news stories in Politics, Entertainment, Sports, Technology, Business and much more from India and around the world.
More from India
More from World
More from Sports
More from Entertaiment
- DNA: Exiled Kashmiri Pandits share their heart wrenching stories
- Basic ideals of Constitution are in danger: Sonia Gandhi
- PM Modi greets nation on occasion of first Constitution Day
- Manjula Vaghela's journey: From rag picker to head of a firm with Rs 1 cr turnover!
- Indian Army faces shortage of field firing ranges in J&K
- Woman commits suicide after heated discussion with husband over Aamir Khan's intolerance remark
- Eat smart to slow down ageing and increase longevity!
- Intolerance issue: Those attacking me are only proving my point, says Aamir Khan – Read full statement
- Setback to Kejriwal-led AAP as MLA Akhilesh Tripathi arrested in riot case
- 10 interesting facts about Constitution which every Indian must know