Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs

被引:11
作者
Andrade, Ewerton R. [1 ]
Simplicio, Marcos A., Jr. [2 ]
Barreto, Paulo S. L. M. [2 ]
dos Santos, Paulo C. F. [3 ]
机构
[1] Univ Sao Paulo, Escola Politecn, Sao Paulo, Brazil
[2] Univ Sao Paulo, Escola Politecn, Dept Comp & Digital Syst Engn, Sao Paulo, Brazil
[3] Univ Sao Paulo, Escola Politecn, Comp Engn, Sao Paulo, Brazil
基金
巴西圣保罗研究基金会;
关键词
Password hashing; cryptographic sponges;
D O I
10.1109/TC.2016.2516011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present Lyra2, a password hashing scheme (PHS) based on cryptographic sponges. Lyra2 was designed to be strictly sequential for a given number of cores (i.e., not easily parallelizable beyond that number), providing strong security even against attackers using custom hardware or GPUs. At the same time, it is very simple to implement in software and allows legitimate users to fine tune its memory and processing costs according to the desired level of security against brute force password-guessing. Lyra2 is an improvement of the recently proposed Lyra algorithm, providing an even higher security level against different attack venues and overcoming some limitations of this and other existing schemes.
引用
收藏
页码:3096 / 3108
页数:13
相关论文
共 43 条
  • [1] Lyra: password-based key derivation with tunable memory and processing costs
    Almeida, Leonardo C.
    Andrade, Ewerton R.
    Barreto, Paulo S. L. M.
    Simplicio, Marcos A., Jr.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (02) : 75 - 89
  • [2] [Anonymous], 1973, P 5 ANN ACM S THEORY
  • [3] [Anonymous], 2007, P 16 INT C WORLD WID, DOI DOI 10.1145/1242572.1242661
  • [4] [Anonymous], 2013, NIST SP
  • [5] Aumasson JP, 2014, LECT NOTES COMPUT SC, V8713, P19, DOI 10.1007/978-3-319-11212-1_2
  • [6] Aumasson JP, 2010, LECT NOTES COMPUT SC, V6147, P318, DOI 10.1007/978-3-642-13858-4_18
  • [7] Aumasson Jean-Philippe., 2013, BLAKE2: simpler, smaller, fast as MD5, DOI [10.1007/978-3-642-38980-1_8, DOI 10.1007/978-3-642]
  • [8] Aumasson Jean-Philippe., 2010, SHA 3 PROPOSAL BLAKE
  • [9] Bernstein D. J., 2005, TECH REP
  • [10] Bertoni G., 2011, Cryptographic sponge functions