In this paper we give a detailed security analysis of PAS and show that PAS is insecure against both brute force attack and a probabilistic attack. In particular we show that the security of PAS against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.
Category / Keywords: cryptographic protocols / PAS; authentication; Matsumoto-Imai threat model; attack; security; usability; OTP (one-time password); Publication Info: Full edition of a paper (to-be-)published in the Proceedings of 25th Annual Computer Security Applications Conference (ACSAC 2009). Date: received 27 Sep 2009 Contact author: hooklee at gmail com Available format(s): PDF | BibTeX Citation Note: This is a full edition of a paper (to-be-)published in the proceedings of ACSAC2009. A preprint of the published edition is available at http://www.hooklee.com/Papers/ACSAC2009.pdf. Version: 20090929:053234 (All versions of this report) Short URL: ia.cr/2009/476 Discussion forum: Show discussion | Start new discussion