Title: The count-min sketch is vulnerable to offline password-guessing attacks
Authors: Jaryn Shen; Qingkai Zeng
Addresses: State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210023, China; Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China ' State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210023, China; Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China
Abstract: The count-min sketch is used to prevent users from selecting popular passwords so as to increase password-guessing attackers' cost and difficulty. This approach was proposed by Schechter et al. (2010) at USENIX Conference on Hot Topics in Security in 2010. Schechter et al. (2010) originally intended the count-min sketch to resist password-guessing attacks. In this paper, however, for the first time, we point out that the count-min sketch is vulnerable to offline password-guessing attacks. Taking no account of the false positive rate, the offline password-guessing attack against the count-min sketch and the password file requires less computational cost than the benchmark attack against only the password file. Taking the false positive into account, in order to eliminate the threat to quicken password-guessing rate, the lower bound of the false positive rate must be greater than 33% in the naked count-min sketch and greater than 31% in the expensive count-min sketch, both of which are too high and unacceptable.
Keywords: password; guess; offline attacks; count-min sketch; password file; false positive; authentication.
DOI: 10.1504/IJICS.2022.122912
International Journal of Information and Computer Security, 2022 Vol.18 No.1/2, pp.27 - 39
Received: 02 Feb 2019
Accepted: 26 Aug 2019
Published online: 17 May 2022 *