Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks
Date: August 2012
Publication: Proceedings of the 21st USENIX Security Symposium, Security '12
Source 1: https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final25.pdf
Source 2: http://bojinov.org/professional/usenixsec2012-rubberhose.pdf
Cryptographic systems often rely on the secrecy of cryptographic keys given to users. Many schemes, however, cannot resist coercion attacks where the user is forcibly asked by an attacker to reveal the key. These attacks, known as rubber hose cryptanalysis, are often the easiest way to defeat cryptography. We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. Implicit learning refers to learning of patterns without any conscious knowledge of the learned pattern. We use a carefully crafted computer game to plant a secret password in the participantís brain without the participant having any conscious knowledge of the trained password. While the planted secret can be used for authentication, the participant cannot be coerced into revealing it since he or she has no conscious knowledge of it. We performed a number of user studies using Amazonís Mechanical Turk to verify that participants can successfully re-authenticate over time and that they are unable to reconstruct or even recognize short fragments of the planted secret.
PasswordResearch.com Note: Video of presentation on this paper: https://www.usenix.org/conference/usenixsecurity12/neuroscience-meets-cryptography-designing-crypto-primitives-secure
Do you have additional information to contribute regarding this research paper? If so, please email firstname.lastname@example.org with the details.