【24h】

Security Analysis of saltpassword Hashes

机译:salt 密码哈希的安全性分析

获取原文
获取原文并翻译 | 示例

摘要

Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as birthday and dictionary attacks on the hash values of passwords to find passwords, it is usually recommended to apply hash function to the combination of both the salt and password, denoted salt||password, to prevent these attacks. In this paper, we present the first security analysis of salt||password hashing application. We show that when hash functions based on the compression functions with easily found fixed points are used to compute the salt||password hashes, these hashes are susceptible to precomputed offline birthday attacks. For example, this attack is applicable to the salt||password hashes computed using the standard hash functions such as MD5, SHA-1, SHA-256 and SHA-512 that are based on the popular Davies-Meyer compression function. This attack exposes a subtle property of this application that although the provision of salt prevents an attacker from finding passwords, salts prefixed to the passwords do not prevent an attacker from doing a precomputed birthday attack to forge an unknown password. In this forgery attack, we demonstrate the possibility of building multiple passwords for an unknown password for the same hash value and salt. Interestingly, password||salt (i.e. salts suffixed to the passwords) hashes computed using Davies-Meyer hash functions are not susceptible to this attack, showing the first security gap between the prefix-salt and suffix-salt methods of hashing passwords.
机译:保护用于认证计算机系统和网络的密码是密码哈希功能最重要的应用之一。由于对密码的哈希值应用了诸如生日和字典攻击之类的预计算内存查找攻击,以查找密码,因此通常建议对hash和密码的组合应用哈希函数,表示为salt || password,防止这些攻击。在本文中,我们提出了salt ||哈希算法应用程序的首次安全性分析。我们表明,当使用基于具有容易找到的固定点的压缩函数的哈希函数来计算salt || password哈希时,这些哈希很容易受到预先计算的离线生日攻击。例如,此攻击适用于使用基于流行的Davies-Meyer压缩函数的标准哈希函数(例如MD5,SHA-1,SHA-256和SHA-512)计算的密码哈希。此攻击暴露了此应用程序的一个微妙属性:尽管提供盐可以阻止攻击者查找密码,但是以盐开头的盐不能阻止攻击者进行预先计算的生日攻击以伪造未知密码。在此伪造攻击中,我们演示了针对相同哈希值和盐的未知密码构建多个密码的可能性。有趣的是,使用Davies-Meyer哈希函数计算的密码盐(即后缀为密码的盐)不易受到此攻击的影响,这显示了哈希盐的前缀盐和后缀盐方法之间的第一个安全漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号