Take-a-tale - honeyword generation technique, where a tail is added to the password. A number of passwords with same body, but with different tails are created (Juels and Rivest, 2013).
I have decided to research this technique further and to write a python program that demonstrates how it works and how honeywords are supposed to work in general. The file take_a_tail.py is available for everyone on my google drive: link
I have also written a .bat file which starts a program and writes basic information about it:
User can enter 4 commands:
register - to register a new user in a system
login - to try to log in into the system
attack - prints a list of user with passwords
stop - stops program
First of all we need to register a new user:
After entering a new username and a password, user is asked to add 3 numbers after password. This 3 numbers are a tail. After registration his username and password are contained in memory with additional 5 honeywords - decoy passwords.
Now we have to usernames contained alongwith 6 different passwords, 5 from which are decoy passwords - honeywords
However, let's imagine that adversary got into the host pc and had stolen the file with usernames and passwords. It can be simulated with entering attack command:
Reference:
Juels, A. and Rivest, R.L. (2013) ‘Honeywords: making password-cracking detectable’, in. CCS, Berlin, Germany: ACM, pp. 145–160. Available from: https://dl.acm.org/doi/abs/10.1145/2508859.2516671?casa_token=z0BT8j2R23UAAAAA:rWbGmGVWkVHKWKFF4USMBi0I8uIyQqJtHioVEPnIGUqiPR4nPE-jmn665OBxEUVr3UrzZfDo7isQ#sec-ref.

Good post, nice process shown and discussion.. I like that you are going beyond what is asked for and exploring areas of interest to you that relate to your project theme - as a final post consider reflecting on what you have explored and learned through this research project.
ReplyDelete