Select Language

MFDPG: Multi-Factor Deterministic Password Management with Zero Stored Secrets

Analysis of a novel password management system using multi-factor key derivation and deterministic generation to eliminate credential storage and upgrade legacy authentication.
computationalcoin.com | PDF Size: 0.3 MB
Rating: 4.5/5
Your Rating
You have already rated this document
PDF Document Cover - MFDPG: Multi-Factor Deterministic Password Management with Zero Stored Secrets

1. Introduction & Overview

Passwords remain the dominant authentication mechanism, yet their management presents a critical security challenge. Traditional password managers create central points of failure, as evidenced by breaches like LastPass. Deterministic Password Generators (DPGs) have been proposed for over two decades as an alternative, generating unique passwords per site from a master secret and domain name, eliminating storage. However, existing DPGs suffer from significant security, privacy, and usability flaws that have prevented widespread adoption.

This paper introduces the Multi-Factor Deterministic Password Generator (MFDPG), a novel design that addresses these shortcomings. MFDPG leverages multi-factor key derivation to harden the master secret, employs probabilistic data structures for secure password revocation, and uses deterministic finite automaton (DFA) traversal to comply with complex password policies. The result is a system that requires zero client or server-side secret storage while effectively acting as a client-side upgrade for weak password-only websites to strong multi-factor authentication.

Key Statistics

  • 45 Existing DPGs Analyzed: Comprehensive survey of prior work.
  • 100% Compatibility: MFDPG evaluated against the top 100 web applications.
  • Zero Stored Secrets: Eliminates the central vault vulnerability.

2. Analysis of Existing DPGs

The paper surveys 45 prior DPG proposals (e.g., PwdHash) to identify systemic flaws.

2.1 Security & Privacy Flaws

Core Vulnerability: Most DPGs use a single master password. If any generated site password is compromised, it can be used to directly attack and potentially recover the master password through offline brute-force or dictionary attacks. This violates the principle of secret independence.

Privacy Leakage: Simple DPGs can leak service usage patterns. The act of generating or changing a password for a specific domain can be inferred, compromising user privacy.

2.2 Usability Limitations

Password Rotation: Changing a password for a single site typically requires changing the master secret, which then changes all derived passwords—an impractical user experience.

Policy Compliance: Most DPGs generate passwords of a fixed format, unable to adapt to diverse and complex website password policies (e.g., requiring special characters, specific lengths, or excluding certain symbols).

3. The MFDPG Design

MFDPG introduces three core innovations to overcome these limitations.

3.1 Multi-Factor Key Derivation

Instead of a single master password, MFDPG uses a multi-factor key derivation function (MFKDF). The final key $K$ is derived from multiple factors:

$K = \text{MFKDF}(\text{Password}, \text{TOTP Seed}, \text{Security Key PubKey}, ...)$

This approach significantly raises the attack cost. Compromising a site password reveals nothing about the TOTP seed or hardware key, making offline attacks on the master password infeasible. It effectively upgrades password-only sites to MFA.

3.2 Cuckoo Filters for Revocation

To solve password rotation for individual sites without changing the master factors, MFDPG uses a Cuckoo Filter—a probabilistic data structure. A revoked password's hash is inserted into a client-side filter. During password generation, the system checks the filter and, if a collision is found, iteratively applies a counter (e.g., $\text{Hash}(\text{Domain} || \text{counter})$) until a non-revoked password is found. This allows per-site revocation without storing a plaintext list of used sites, preserving privacy.

3.3 DFA-Based Password Generation

To meet arbitrary regular expression-based password policies, MFDPG models the policy as a Deterministic Finite Automaton (DFA). The generator uses a cryptographically secure pseudorandom number generator (CSPRNG), seeded by the derived key $K$ and domain, to traverse the DFA, emitting characters corresponding to valid state transitions. This ensures the output password is both unique per domain and guaranteed to comply with the specified policy.

4. Evaluation & Results

The authors conducted a practical evaluation of MFDPG:

  • Compatibility: The system was tested against the password policies of the 100 most popular websites. The DFA-based generator successfully created compliant passwords for all sites, demonstrating universal practicality.
  • Security Analysis: The use of MFKDF was shown to mitigate master password attacks even if multiple site passwords are leaked. The Cuckoo Filter design prevents service usage pattern leakage with a tunable false-positive rate.
  • Performance: On-device operations (key derivation, filter check, DFA traversal) add negligible latency (milliseconds) to the login process, making it suitable for real-world use.

Chart Implication: A hypothetical bar chart would show attack cost (in computational years) on the Y-axis, comparing "Traditional DPG (Single Factor)" and "MFDPG (Multi-Factor)". The bar for MFDPG would be orders of magnitude higher, visually underscoring its security improvement.

5. Core Analyst Insight

Core Insight: MFDPG isn't just another password manager; it's a strategic end-run around the systemic failure of web authentication adoption. While the FIDO Alliance pushes for a passwordless future, MFDPG pragmatically acknowledges that legacy passwords will persist for decades. Its genius is in allowing the user to unilaterally enforce MFA on any site, without waiting for the service provider to upgrade their infrastructure—a classic example of client-side innovation forcing de facto standards, reminiscent of how HTTPS Everywhere pushed encryption adoption.

Logical Flow: The paper's argument is compelling: 1) Stored credentials are a liability (proven by breaches). 2) Past DPGs were theoretically sound but practically flawed. 3) Therefore, the solution is to augment the DPG paradigm with modern cryptographic constructs (MFKDF) and data structures (Cuckoo Filters). The logic is clean, moving from problem diagnosis to a synthesized solution that directly addresses each diagnosed flaw.

Strengths & Flaws: The primary strength is its elegant threat model shift. By binding the secret to multiple factors, it moves the attack surface from "steal one password" to "compromise multiple independent factors," a much harder task as noted in NIST's Digital Identity Guidelines (SP 800-63B). The use of a Cuckoo Filter is a clever, privacy-preserving fix for revocation. However, a critical flaw is the reliance on client-side policy awareness. The user must know/input each site's password policy for the DFA to work, creating a potential usability hurdle and initial setup cost. This contrasts with the fully automated ideal. Furthermore, while it upgrades security client-side, it does nothing against phishing on the server-side—a stolen MFDPG-generated password is still usable by an attacker until revoked.

Actionable Insights: For security teams, MFDPG presents a viable blueprint for internal enterprise password management, especially for service accounts, eliminating credential vaults. For product managers, this research highlights an underserved market: user-side authentication enhancers. The next logical product is a browser extension that implements MFDPG, coupled with a crowdsourced database of website password policies (like "Password Rules" from the W3C) to automate the DFA setup. Investment should flow into tools that bridge the gap between cutting-edge academic constructs like MFDPG and deployable, user-friendly applications.

6. Technical Deep Dive

Key Derivation Formula: The core MFKDF can be conceptualized as:
$K = \text{HKDF-Expand}(\text{HKDF-Extract}(salt, F_1 \oplus F_2 \oplus ... \oplus F_n), \text{info}, L)$
Where $F_1, F_2, ..., F_n$ are the standardized outputs ("factor shares") from each authentication factor (password hash, TOTP code, security key attestation, etc.). This follows the modular design principles outlined in the HKDF RFC 5869.

DFA Traversal Algorithm (Pseudocode):
function generatePassword(key, domain, policyDFA):
  prng = ChaCha20(key, domain) // Seed CSPRNG
  state = policyDFA.startState
  password = ""
  while not policyDFA.isAccepting(state):
    transitions = policyDFA.getValidTransitions(state)
    choice = prng.next() % len(transitions)
    selectedTransition = transitions[choice]
    password += selectedTransition.character
    state = selectedTransition.nextState
  return password

7. Analysis Framework & Case Study

Framework: Security-Usability-Privacy (SUP) Trade-off Analysis. This framework evaluates authentication systems across three axes. Let's apply it to MFDPG vs. LastPass:

  • Security: LastPass: High, but with a catastrophic central failure mode. MFDPG: Very High, distributed risk via multi-factor derivation, no central vault. (MFDPG Wins)
  • Usability: LastPass: High, auto-fill, cross-device sync. MFDPG: Medium-High, seamless generation but requires policy setup and factor management. (LastPass Wins)
  • Privacy: LastPass: Low, service knows all your sites. MFDPG: High, zero knowledge by design. (MFDPG Wins)

Case Study - The LastPass Breach: In the 2022 breach, encrypted password vaults were exfiltrated. Attackers could then target master passwords offline. If users had used MFDPG, there would have been no vault to steal. Even if a site password was leaked elsewhere, the MFKDF construction would have prevented escalation to the master secret. This case starkly illustrates the paradigm shift MFDPG offers.

8. Future Applications & Directions

1. Post-Quantum Cryptography (PQC) Integration: The MFKDF structure is agnostic to the underlying crypto. As quantum computers threaten current hash functions (like SHA-256), MFDPG can integrate PQC-standardized algorithms (e.g., SPHINCS+, LMS) for future-proofing, a direction aligned with NIST's PQC standardization project.

2. Decentralized Identity & Web3: MFDPG's "zero stored secrets" philosophy aligns with decentralized identity (e.g., W3C Verifiable Credentials). It could generate unique, deterministic credentials for accessing decentralized applications (dApps) or signing transactions, acting as a user-friendly seed phrase manager.

3. Enterprise Secret Management: Beyond user passwords, MFDPG's principles can be applied to machine-to-machine authentication, generating unique API keys or service account passwords from a master corporate secret and the service identifier, simplifying rotation and audit.

4. Biometric Factor Integration: Future iterations could incorporate local biometric templates (e.g., via WebAuthn's biometric assertion) as a derived factor, enhancing convenience while maintaining the zero-storage property, provided biometric data never leaves the device.

9. References

  1. Nair, V., & Song, D. (Year). MFDPG: Multi-Factor Authenticated Password Management With Zero Stored Secrets. [Conference/Journal Name].
  2. Grassi, P., et al. (2017). Digital Identity Guidelines: Authentication and Lifecycle Management. NIST Special Publication 800-63B.
  3. Krawczyk, H., & Eronen, P. (2010). HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869, IETF.
  4. Ross, B., et al. (2005). Stronger Password Authentication Using Browser Extensions. USENIX Security Symposium. (PwdHash)
  5. Fan, B., et al. (2014). Cuckoo Filter: Practically Better Than Bloom. Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies.
  6. FIDO Alliance. (2022). FIDO2: WebAuthn & CTAP Specifications. https://fidoalliance.org/fido2/
  7. National Institute of Standards and Technology. (2022). Post-Quantum Cryptography Standardization. https://csrc.nist.gov/projects/post-quantum-cryptography