Paper 2011/248

Fast Password Recovery Attack: Application to APOP

Fanbao Liu, Yi Liu, Tao Xie, and Yumeng Feng

Abstract

In this paper, we propose a fast password recovery attack to APOP application in local which can recover a password with 11 characters in less than one minute, recover a password with 31 characters extremely fast, about 4 minutes, and for 43 characters in practical time. These attacks truly simulate the practical password recovery attacks launched by $malware$ in real life, and further confirm that the security of APOP is totally broken. To achieve these dramatical improvements, we propose a group satisfaction scheme, apply the divide-and-conquer strategy and a new suitable MD5 collision attack to greatly reduce the computational complexity in collision searching with high number of chosen bits. The average time of generating an ``\textit{IV Bridge}" is optimized to 0.17 second on ordinary PC, the average time of generating collision pairs for recovering passwords up to 11 characters is about 0.08 second, for 31 characters is about 0.15 second, for 39 characters is about 4.13 seconds, for 43 characters is about 20 seconds, and collisions for recovering passwords as long as 67 characters can be theoretically generated. These techniques can be further applied to reduce the complexity of producing a 1-bit-free collisions for recovering the first 11 characters, whose main target is that to reduce the number of challenges generated in APOP attack, to about $2^{36}$ MD5 compressions.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
MD5APOPChallenge and ResponsePassword RecoveryGroup Satisfaction SchemeDivide-and-ConquerCollision Attack.
Contact author(s)
liufanbao @ gmail com
History
2011-05-19: received
Short URL
https://ia.cr/2011/248
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/248,
      author = {Fanbao Liu and Yi Liu and Tao Xie and Yumeng Feng},
      title = {Fast Password Recovery Attack: Application to {APOP}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2011/248},
      year = {2011},
      url = {https://eprint.iacr.org/2011/248}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.