Password Recovery On Challenge And Response: Impossible Differential Attack On Hash Function

Yu Sasaki,Lei Wang,Kazuo Ohta,Noboru Kunihiro
DOI: https://doi.org/10.1007/978-3-540-68164-9_20
2008-01-01
Abstract:We propose practical password recovery attacks against two challenge-response authentication protocols using MD4. When a response is computed as MD4(Password parallel to Challenge), passwords up to 12 characters are practically recovered. To recover up to 8 characters, we need 16 times the amount of eavesdropping and 16 times the number of queries, and the off-line complexity is less than 2(35) MD4 computations. To recover up to 12 characters, we need 2(10) times the amount of eavesdropping and 2(10) times the number of queries, and the off-line complexity is less than 2(40) MD4 computations. When a response is computed as MD4(Password parallel to Challenge parallel to Password), passwords up to 8 characters are practically recovered by 2(8) times the amount of eavesdropping and 2(8) times the number of queries, and the off-line complexity is less than 2(39) MD4 computations. Our approach is similar to the "Impossible differential attack", which was originally proposed for recovering the block cipher key. Good impossible differentials for hash functions are achieved by using local collision. This indicates that the presence of one practical local collision can damage the security of protocols.
What problem does this paper attempt to address?