[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: shared secret vulnerability
Clint,
Yes, the entropy isn't really increased. In the amplification draft,
I often used the term "effective entropy", since it is really
that the
added difficulty in attacking the hashed secret makes it
equivalent in entropy to a stronger secret for the purpose of
dictionary attack.
There is a "precomputed" type of dictionary attack in which
a dictionary is computed in advance and stored on, say,
CD-ROM. The CD-ROM items are then used to attack a
signature. Thus, if the attacker first created a CD-ROM of all
amplified shared secrets based on likely precursor secrets,
the attack from such a CD-ROM against a signature with
an amplified secret would be no harder than an attack against
a signature based on a precursor secret. This illustrates your
point about conservation of entropy. However, to create such
a CD-ROM would take a very, very long time and you'd need
lots of CD-ROMs.
Paul
Clint Chapin wrote:
My impression is that hashing doesn't add any more entropy than was
already present in the input. Yes, hashing adds time to the
calculation, but the output itself isn't any more entropic than the input
was. Am I incorrect?
Clint (JOATMON) Chaplin
>>> Joshua Wright <jwright@hasborg.com> 08/04/04 13:54 PM
>>>
Paul Funk wrote:
> The idea is that you take an ordinary secret, hash it many
times,
> and get a resulting "amplified" shared secret that
multiplies the
> difficulty of attack by the number of times it has been
hashed. The
> draft suggests 0x100000 (~ one million) iterations, adding 2 ^
20
> bits of effective entropy to the secret.
While I believe this algorithm is effective at adding entropy to a
password such as the RADIUS secret, it does not resolve the issue of a
widespread shared secret distributed throughout an organization. Without
a mechanism in place to regularly change the secret, the use of shared
secrets in this fashion is reminiscent of WEP pre-shared keys. As most
people are painfully aware, shared secret do not stay
secretive.
That being said, I like Paul's idea for effectively adding entropy to
the shared secret that will prolong a brute-force attack. However,
I do
not believe that this is effective at resolving weak authentication
between the RADIUS authentication server and NAS.
-Joshua Wright
jwright@sans.org or
jwright@hasborg.com
--
-Joshua Wright
jwright@hasborg.com
http://home.jwu.edu/jwright/
pgpkey:
http://home.jwu.edu/jwright/pgpkey.htm
fingerprint: FDA5 12FC F391 3740 E0AE BDB6 8FE2 FC0A D44B 4A73
Paul Funk
Funk Software, Inc.
617 497-6339
paul@funk.com