Password Authentication Using Hopfield Neural Networks Shouhong Wang; Hai Wang Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on Volume: 38 , Issue: 2 Publication Year: 2008 Speaker:Hong-Ji Wei Outline 1. 2. 3. 4. 5. 6. Introduction layered neural network(LNN) Pattern Recall by Hopfield Neural Networks(HNN) New Password Authentication Scheme Experiments Conclusion 1. Introduction • Computer security has been one of the most important issues in the information technology era. • Among many computer access control techniques password authentication has been widely used for a long time • A common password authentication approach is the use of verification tables 1. Introduction Verification tables UsernID IDk IDf User(IDk,PWk) Response Result Userk Hacker Password F(PWk) F(PWf) 2. layered neural network(LNN) • To avoid this problem, a layered neural network scheme has been proposed for password authentication Weight tables Weight Weightk IDk W2 PWk Userk Neural yk DBIVk DBIV = desired binary integer vector(e.g. [0,0,1,1]) 2.1. Advantages of LNN 1) If hacker want to break into the system by modifying the neural network weights an intruder must figure out all existing valid IDs and passwords, and retrain the neural network to accommodate the new forged passwords 2) There would be fewer restrictions on the user’s choice of passwords 3) It is easy for the system to add other features (e.g., permission for accessing a specific server) to the training data set. 4) The log-in process takes an insignificant amount of time to verify the user ID and password. 2.1. Disadvantages of LNN 1) The training time for the layered neural networks is extremely long. When a new user is added to the system or a user password is changed, the layered neural network must be retrained requiring more than 5 min for a small system with 50 users or more than 30 min for a small system with 100 users 2) The output of the layered neural network will rarely be a discrete binary integer. For instance, suppose that the desired binary integer vector is [0, 0, 1, 1]. layered neural network output is often considered to be the desired vector. [0.00005, 0.00003, 0.99998, 0.99999] 3. Pattern Recall by Hopfield Neural Networks(HNN) 1) Relevant Characteristics of HNN 2) Major Issue of Pattern Recall 3) Approach to the Pattern Recall Issue 3. 1. Relevant Characteristics of HNN During the pattern recall phase, yi is set to the unknown input pattern, and a computation is performed using N y j (t 1) H wij yi (t ) i 1 i j (1 j N ) 2 y2 3 y3 D s s xi s j i j wij s 1 i j 0 yN y1 H w11 y1 w21 y2 w31 y3 ... wN1 y N wij 1 …….. …….. N y1 (1 i, j k ) 3. 2. Major Issue of Pattern Recall • This study examines password authentication through pattern recall • If the output of this HNN execution is the same as the input, the pattern has been seen before(legal pattern) • The recall quality is highly dependent upon the informational capacity of the HNN that is referred to as the quantity of patterns that the HNN can store • HNN can precisely recall every pattern when the informational capacity is large enough 3. 3. Approach to the Pattern Recall Issue • To improve the recall performance of an HNN, we must increase its information capacity and make the patterns sparsely • Suppose that the patterns consist of three binary digits (e.g., [1, 0, 1]),the minimal number of nodes of HNN needed for recalling these patterns is 3 • For example, if the node is 7, the original 3-bit patterns would be sparsely coded as 7-bit patterns such as [0, 1, 0, 0, 0, 1, 0] 4. New Password Authentication Scheme The authentication scheme includes three major procedures 1) Registration 2) Log-in authorization 3) Password change 4.1. Registration 4.2. Log-in Authorization 4.3. Password Change When the user needs or wants to change the password 1) log-in authorization procedure is executed to allow the access to the system 2) the system executes the registration procedure to register the new password 3) system deletes the old password by subtracting the weights of the HNN based on Uk 5. Experiments There have two simulation experiments were conducted in experiments section in this paper 1) Computational Time for Registration 2) Performance on Passwords With Similar Character Sequences 5.1.Computational Time for Registration • Suppose that a user ID and its encrypted password contain characters of the set [A–Z, a–z, 0–9]. • 6 bits are sufficient for representing one character • Assume that a user ID and the encrypted password contains four characters • Accordingly, 48 bits are sufficient to represent 248 (about 200 trillion) pairs of user ID and encrypted passwords 5.1.Computational Time for Registration An HNN with 95 nodes was constructed for the simulation and was trained by the 10 million sample points that represented legal users’ ID and passwords 5.2. Performance on Passwords With Similar Character Sequences • In real life, passwords are not random. Many passwords have similar character sequences • In this experiment, 1 million legal users’ ID and passwords and 1 million illegal users’ ID and passwords were generated and every 1000 legal users’ ID and passwords and 1000 illegal users’ ID and passwords had the same 36-bit sequence within the entire 48-bit sequence of the encrypted passwords 5.2. Performance on Passwords With Similar Character Sequences • The purpose of our experiment was to show the true power of the Reed-Solomon coding algorithm to separate similar sequences in the sparse space and make them dissimilar enough for inputs to the HNN • The registration process of each user’s ID and password was always successful. • This success indicates that the probability of registration failures for the same user is close to zero 6. Conclusion • This paper shows that an HNN-based authentication scheme can effectively be used for access authentication in the open computing environment • The authentication scheme incorporating the use of HNN can recall information for a legal user’s ID and password instantly and accurately • Our experiments have demonstrated the usefulness and robustness of the proposed authentication scheme