In this paper we consider the following problem: given independent samples from an unknown distribution over passwords can we generate high confidence upper/lower bounds on the guessing curve where and the passwords are ordered such that . Intuitively, represents the probability that an attacker who knows the distribution can guess a random password within guesses. Understanding how increases with the number of guesses can help quantify the damage of a password cracking attack and inform password policies. Despite an abundance of large (breached) password datasets upper/lower bounding remains a challenging problem. We introduce several statistical techniques to derive tighter upper/lower bounds on the guessing curve which hold with high confidence. We apply our techniques to analyze large password datasets finding that our new lower bounds dramatically improve upon prior work. Our empirical analysis shows that even state-of-the-art password cracking models are significantly less guess efficient than an attacker who knows the distribution. When is not too large we find that our upper/lower bounds on are both very close to the empirical distribution which justifies the use of the empirical distribution in settings where is not too large i.e., closely approximates . The analysis also highlights regions of the curve where we can, with high confidence, conclude that the empirical distribution significantly overestimates . Our new statistical techniques yield substantially tighter upper/lower bounds on though there are still regions of the curve where the best upper/lower bounds diverge significantly.
View on arXiv