1.1 Research problem
Passwords authentication may be seen as one of the weakiest points in
the modern security chain (Febrache,
2016). However, usually the problem is not in the passwords themselves, but
in the way, people use them. According to statistics people tend to use
personal information and words that can be found in dictionaries while creating
their password. According to Huan at el. (2017), 23.75% of the whole password
space consist of personal information. Such way of creating passwords make them
extremely vulnerable against brute-force attacks.
Researchers all over the world are trying to develop a new authentication system which will be able to eliminate all problems connected with using passwords. However, passwords are still one of the most efficient and popular ways of authentication. Moreover, there are a lot of evidence that passwords are still here to stay with us in near future (Bošnjak and Brumen, 2019).
One of the possible solutions is to continue using passwords, but to improve
the way they are stored and processed. Nowadays, raw passwords are not stored
in a system. Usually, passwords are stored as a hash – result of a complex
mathematical formula, which cannot be reversed (Evans,
2018).
Such hash may be salted – which means that the hash is some how modified in order to increase security level. However, modern targeted password guessers are able to crack passwords in seconds (Huan et al., 2017). Therefore, one possible solution is to make a hashing function more complicated. However, in this work another possible solution is proposed.
1.2 Thesis
The topic of the work is honeywords – decoy passwords which are
stored along with the real one. When an adversary cracks passwords and tries to
enter them, it is always possible to enter a decoy password which will trigger
an alarm and necessary measures will be taken. The aim of this work is to
assess advantages and disadvantages of such idea, research the results of its
implementation and to propose the areas for further research.
Reference:
Bošnjak,
L. and Brumen, B. (2019) ‘Rejecting the death of passwords: Advice for the
future’, Computer Science and Information Systems, 16(1), pp. 313–332.
Available at: https://doi.org/10.2298/CSIS180328016B (Accessed: 27 October
2021).
Evans, L. (2018) Cybersecurity: What do you
need to know about computer and Cyber Security, Social Engineering, The
Internet of things + An Essential guide to ethical hacking for beginners.
Febrache, D. (2016) ‘Passwords are broken – the
future shape of biometrics’, Biometric Technology Today, 2016(3), pp.
5–7. Available at:
https://www.sciencedirect.com/science/article/pii/S0969476516300492 (Accessed:
27 October 2021).
Huan, Z., Qizu, L. and Zhang, F. (2017) ‘An Analysis of Targeted Password Guessing Using Neural Networks’, in. IEEE-security.com. Available at: http://www.ieee-security.org/TC/SP2017/poster-abstracts/IEEE-SP17_Posters_paper_24.pdf (Accessed: 27 October 2021).


Good start - on the final reference should there be an accessed on date? It's an interesting subject area, try to use cross referencing to see what different people think and have said about this in different articles/papers/books. As opinions may differ.
ReplyDelete