all InfoSec news
SweetPAKE: Key exchange with decoy passwords
Feb. 26, 2024, 2:36 a.m. |
IACR News www.iacr.org
ePrint Report: SweetPAKE: Key exchange with decoy passwords
Afonso Arriaga, Peter Y.A. Ryan, Marjan Skrobot
Decoy accounts are often used as an indicator of the compromise of sensitive data, such as password files. An attacker targeting only specific known-to-be-real accounts might, however, remain undetected. A more effective method proposed by Juels and Rivest at CCS'13 is to maintain additional fake passwords associated with each account. An attacker who gains access to the password file is unable to tell apart real …
accounts attacker compromise data decoy eprint report exchange files key password passwords peter real report sensitive sensitive data targeting undetected
More from www.iacr.org / IACR News
A Deniability Analysis of Signal's Initial Handshake PQXDH
3 days, 3 hours ago |
www.iacr.org
BGJ15 Revisited: Sieving with Streamed Memory Access
3 days, 3 hours ago |
www.iacr.org
Quantum Key-Revocable Dual-Regev Encryption, Revisited
3 days, 3 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Technical Support Specialist (Cyber Security)
@ Sigma Software | Warsaw, Poland
OT Security Specialist
@ Adani Group | AHMEDABAD, GUJARAT, India
FS-EGRC-Manager-Cloud Security
@ EY | Bengaluru, KA, IN, 560048