• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News
  • AI Spies News

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

SPHINX

A Password Store that Perfectly Hides Passwords from Itself

Passwords are the prime example of text-based authentication, and the most dominant means of user authentication deployed on the Internet today. However, they suffer from numerous security and usability issues. For example, passwords are often weak secrets, i.e. low-entropy – short and non-random, due to the human memorability requirement. Current mechanisms password managers have been proposed to improve the security of systems relying on passwords. However, these schemes do not address the issue of compromised or malicious servers that store the passwords. Given that the users reuse their password over multiple accounts, exposure of the passwords stored on one service leads to compromise of other services that use the same password. Similarly, if the password manager that stores the password gets compromised, all the stored passwords would be reveals.
One broad class of approaches that improves the security of password-based authentication protocol from the client-side or user-side alone (i.e., without making any changes to a persistent server that uses traditional password-based authentication) is referred to as password managers. Password managers allow users to pick randomized high-entropy passwords without the need to memorize them.
In this work, we introduced a new password management mechanism, SPHINX, that can address many security and usability problems with passwords from the client/user side (i.e., transparent to most existing web authentication services, including the typical password-over-TLS mechanism). SPHINX is a device-based password manager that transforms a human-memorable password into a random password with the aid of a device, without the need to store the passwords on the device and without the device learning anything about the password even when computing on it.
In SPHINX, user registers a hardened randomized password rwd with the server, but only remembers a memorable password pwd that could be the same for multiple accounts (we use the terms master password and memorable password interchangeably). For each server S with which the user U has an account, the device D (a smart phone) stores a unique key k. The key is used to map pwd into rwd using the oblivious pseudo random function (OPRF) F such that rwd = Fk(pwd|domain). The OPRF function receives input k from the device and pwd from the user and computes rws as H(pwd|domain, H’(pwd|domain)k), where H is a SHA256 hash and H’ is a special-purpose hash that maps a string to a point on an elliptic curve. pwd and rwd are never stored in C and (in contrast to the current password managers neither rwd nor pwd is ever stored in or exposed to D. Instead, D and C run the PTR protocol to obliviously compute rwd at the login time.

A high-level overview of SPHINX. U enters memorable password pwd and approves the communication on D (explicit consent), D and C run an OPRF protocol (instantiated as FK-PTR) to construct a randomized password rwd, C sends rwd to S over SSL/TLS to authenticate to the service. A smartphone instantiation is developed and tested in the paper. However, the phone can be replaced with an online service.

A high-level overview of SPHINX. U enters memorable password, pwd, and approves the communication on D (explicit consent). D and C run an OPRF protocol (instantiated as FK-PTR) to construct a randomized password, rwd, C sends rwd to S over SSL/TLS to authenticate to the service. A smartphone instantiation is developed and tested in the paper. However, the phone can be replaced with an online service.


Our password manager has several interesting security and usability features including: 1) Resistance to offline dictionary attacks under server compromise (or server being malicious). 2) Resistance to phishing attacks. 3) Resistance to offline dictionary attacks under device compromise (or device being malicious), in particular hiding the user’s master password with information theoretic security. 4) Resistance to eavesdropping and MitM on the device-client channel without the need to establish a confidential channel (the properties of the OPRF protocol executed over this channel ensure that no externally protected or secured channel is needed).

People

Faculty

  • Nitesh Saxena

Student

  • Maliheh Shirvanian (PhD candidate)

External Collaborators:

  • Stanislaw Jarecki (Associate Professor; School of Information and Computer Sciences, University of California at Irvine)
  • Hugo Krawczyk (Research Scientist; IBM T.J. Watson Research Center)

Publication

  • Building and Testing a Hidden-Password Online Password Manager
    Mohammed Jubur, Chistopher Price, Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk and Nitesh Saxena
    In IEEE Transactions on Information Forensics and Security (TIFS), 2025
  • Building and Studying a Password Store that Perfectly Hides Passwords from Itself.
    Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, and Hugo Krawczyk
    In IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Paradigm Shifts in Cryptographic Engineering, 2018
    [pdf]
  • SPHINX: A password store that perfectly hides passwords from itself.
    Maliheh Shirvanian, Stanislaw Jareckiy, Hugo Krawczykz, Nitesh Saxena.
    In IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.
    [pdf]

Recent News

  • Paper accepted to ICME 2025 June 24, 2025
  • SPIES Lab’s Browser Fingerprinting Work in the News June 23, 2025
  • Journal paper accepted to IEEE TIFS June 19, 2025
  • SPIES Lab’s Browser Fingerprinting Work Features in News June 18, 2025
  • Paper Accepted to USENIX Security 2025 June 6, 2025
  • 2 Papers Accepted to PST 2025 June 6, 2025
  • AI Spies News — BPSniff (IEEE S&P 2025) Paper News Story May 12, 2025
  • Launching the AI Spies News Channel May 12, 2025
  • Paper accepted to WiSec 2025 May 11, 2025
  • SPIES Lab’s Secure Messaging Work Features in News May 3, 2025
  • SPIES Lab Student to Start as an Assistant Professor April 18, 2025
  • Dr. Saxena’s Primer on Secure Communications in News Media March 31, 2025
  • Dr. Saxena recognized with the Dean’s Excellence Award! February 14, 2025
  • Dr. Saxena appointed as the Senior Area Editor, IEEE TIFS February 6, 2025
  • 2 Full Papers Accepted to WWW 2025 January 20, 2025
  • Journal paper accepted to IEEE TMC December 18, 2024
  • New post-doctoral researcher joins the lab December 11, 2024
  • Paper Accepted to ACM Computing Surveys 2024 November 30, 2024
  • Paper Accepted to IEEE S&P 2025 October 21, 2024
  • Paper Accepted to Nature Human Behaviour October 20, 2024

© 2016–2025 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment