Feb. 26, 2024, 2:36 a.m. |

IACR News www.iacr.org

ePrint Report: SweetPAKE: Key exchange with decoy passwords

Afonso Arriaga, Peter Y.A. Ryan, Marjan Skrobot


Decoy accounts are often used as an indicator of the compromise of sensitive data, such as password files. An attacker targeting only specific known-to-be-real accounts might, however, remain undetected. A more effective method proposed by Juels and Rivest at CCS'13 is to maintain additional fake passwords associated with each account. An attacker who gains access to the password file is unable to tell apart real …

accounts attacker compromise data decoy eprint report exchange files key password passwords peter real report sensitive sensitive data targeting undetected

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Technical Support Specialist (Cyber Security)

@ Sigma Software | Warsaw, Poland

OT Security Specialist

@ Adani Group | AHMEDABAD, GUJARAT, India

FS-EGRC-Manager-Cloud Security

@ EY | Bengaluru, KA, IN, 560048