seconds for each operation.
We leave an optimized commercial implementa-
tion for future work. With such an implementation
we could study how this approach serves large-scale
systems and measure the performance degradation as
the number of users increases (hundreds, thousands,
millions of users). Also, it would be interesting to
study how the overhead that this approach introduces
affects the user experience, and what is the trade-off
with the extra security layer that is offered.
7 CONCLUSION
In this paper, we proposed a new decentralized design
for user authentication that protects against password
file leaks. To demonstrate the applicability of our ap-
proach, we embed it to the WordPress authentication
system, showing that it can be easily integrated to ex-
isting systems. Future studies with a commercial im-
plementation could measure the scalability and paral-
lelization of the approach, the trade-off with the user
experience, and factors that affect performance and
security of the system (token update frequency, etc).
ACKNOWLEDGEMENTS
This work has received funding from the European
Union’s Horizon 2020 research and innovation pro-
gramme under grant agreement No 830929 (Cy-
berSec4Europe) and from Marie Skłodowska-Curie
grant agreement No. 101007673 (RESPECT). This
work reflects only the author’s view. The Commis-
sion is not responsible for any use that may be made
of the information it contains.
REFERENCES
Assiri, S., Cambou, B., Booher, D. D., and Mohammadin-
odoushan, M. (2020). Software implementation of a
sram puf-based password manager. In Science and In-
formation Conference, pages 361–379. Springer.
Bercovitch, M., Renford, M., Hasson, L., Shabtai, A.,
Rokach, L., and Elovici, Y. (2011). Honeygen: An
automated honeytokens generator. pages 131–136.
Cvrcek, D. (2014). Hardware scrambling-no more pass-
word leaks.
Dionysiou, A., Vassiliades, V., and Athanasopoulos, E.
(2021). Honeygen: Generating honeywords using rep-
resentation learning. In Proceedings of the 2021 ACM
Asia Conference on Computer and Communications
Security, ASIA CCS ’21, page 265–279, New York,
NY, USA. Association for Computing Machinery.
Everspaugh, A., Chatterjee, R., Scott, S., Juels, A., and Ris-
tenpart, T. (2015). The pythia prf service. IACR Cryp-
tology ePrint Archive, 2015:644.
Juels, A. and Rivest, R. L. (2013). Honeywords: Making
password-cracking detectable. In Proceedings of the
2013 ACM SIGSAC conference on Computer & com-
munications security, pages 145–160, Berlin, Ger-
many. ACM.
K. Naik, V. Bhosale, V. D. S. (2016). Generating honey-
words from real passwords with decoy mechanism.
International Journal for Research in Engineering
Application & Management (IJREAM), 02.
Kontaxis, G., Athanasopoulos, E., Portokalidis, G., and
Keromytis, A. D. (2013). Sauth: Protecting user ac-
counts from password database leaks. In Proceedings
of the 2013 ACM SIGSAC conference on Computer
& communications security, pages 187–198, Berlin,
Germany. ACM.
Krebs, B. (2019). Facebook stored hundreds of mil-
lions of user passwords in plain text for years.
https://krebsonsecurity.com/2019/03/facebook-
stored-hundreds-of-millions-of-user-passwords-in-
plain-text-for-years/.
Mohammadinodoushan, M., Cambou, B., Philabaum, C.,
Hely, D., and Booher, D. D. (2019). Implementation
of password management system using ternary ad-
dressable puf generator. In 2019 16th Annual IEEE In-
ternational Conference on Sensing, Communication,
and Networking (SECON), pages 1–8. IEEE.
Morris, R. and Thompson, K. (2002). Password security: A
case history. Communications of the ACM, 22.
OWASP (2021). Password storage cheat sheet.
Provos, N. and Mazieres, D. (1999). A future-adaptable
password scheme. In USENIX Annual Technical Con-
ference, FREENIX Track, pages 81–91, Monterey,
California, USA. USENIX Association.
Sahar, F. (2013). Tradeoffs between Usability and Secu-
rity. IACSIT International Journal of Engineering and
Technology, 5(4).
Shi, C. and Sun, H. (2021). HoneyHash: Honeyword Gen-
eration Based on Transformed Hashes, pages 161–
173. Springer International Publishing, Virtual.
Shi, Z., Yang, C., and Wu, Q. (2012). Scalable md5 crypt
cracker on petascale supercomputer. Advanced Mate-
rials Research, 532-533:1080–1084.
Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., In-
vernizzi, L., Markov, Y., Comanescu, O., Eranti, V.,
Moscicki, A., et al. (2017). Data breaches, phishing,
or malware? understanding the risks of stolen cre-
dentials. In Proceedings of the 2017 ACM SIGSAC
conference on computer and communications secu-
rity, pages 1421–1434, Dallas, USA. ACM.
Wang, D., Cheng, H., Wang, P., Yan, J., and Huang, X.
(2017). A security analysis of honeywords.
Wang, K. C. and Reiter, M. K. (2021). Using amnesia to
detect credential database breaches. In 30th USENIX
Security Symposium (USENIX Security 21).
The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems
567