Cryptographic Module Based Approach for Password Hashing Schemes

被引:1
作者
Chang, Donghoon [1 ]
Jati, Arpan [1 ]
Mishra, Sweta [1 ]
Sanadhya, Somitra Kumar [1 ]
机构
[1] Delhi IIIT D, Indraprastha Inst Informat Technol, Delhi, India
来源
TECHNOLOGY AND PRACTICE OF PASSWORDS, PASSWORDS'14 | 2015年 / 9393卷
关键词
Password; Password hashing; Cryptographic module;
D O I
10.1007/978-3-319-24192-0_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Password Hashing is the technique of performing one-way transformation of the password. One of the requirements of password hashing algorithms is to be memory demanding to provide defense against hardware attacks. In practice, most Cryptographic designs are implemented inside a Cryptographic module, as suggested by NIST in a set of standards (FIPS 140). A cryptographic module has a limited memory and this makes it challenging to implement a password hashing scheme (PHS) inside it. In this work, we propose a novel approach to allow a limited memory cryptographic module to be used in the implementation of a high memory password hashing algorithm. We also analyze all the first round entries of the Password Hashing Competition (PHC) to evaluate the suitability of the submitted algorithms to be implemented with a Cryptographic module. We graphically show that the submissions to the PHC can be securely implemented in a crypto-module following our suggestion. To the best of our knowledge, this is the first attempt in the direction of secure implementation of password hashing algorithms.
引用
收藏
页码:39 / 57
页数:19
相关论文
共 24 条
[1]  
Almeida L. C., 2014, LYRA2 REFERENCE GUID
[2]  
Alvarez R., 2014, CENTRIFUGE PASSWORD
[3]  
[Anonymous], 2014, yescrypt "Password Hashing Scalable Beyond Bcrypt and Scrypt."
[4]  
[Anonymous], 2001, FIPS PUB
[5]  
Bertoni G., 2011, Revised Selected Papers, P320, DOI DOI 10.1007/978-3-642-28496-019
[6]  
Biryukov A., 2014, ARGON V1 PASSWORD HA
[7]  
Cappos J., 2014, PASSWORD HASHING COM
[8]   Rig: A Simple, Secure and Flexible Design for Password Hashing [J].
Chang, Donghoon ;
Jati, Arpan ;
Mishra, Sweta ;
Sanadhya, Somitra Kumar .
INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 :361-381
[9]  
Cox B., 2014, TWOCATS SKINNYCAT CO
[10]  
Durmuth M., 2014, ANTCRYPT SUBMISSION