首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
【24h】

Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks

机译:气球散列:一种内存硬功能,提供可提供的防止顺序攻击

获取原文

摘要

We present the Balloon password-hashing algorithm. This is the first practical cryptographic hash function that: (i) has proven memory-hardness properties in the random-oracle model, (ii) uses a password-independent access pattern, and (iii) meets - and often exceeds - the performance of the best heuristically secure password-hashing algorithms. Memory-hard functions require a large amount of working space to evaluate efficiently and, when used for password hashing, they dramatically increase the cost of offline dictionary attacks. In this work, we leverage a previously unstudied property of a certain class of graphs ("random sandwich graphs") to analyze the memory-hardness of the Balloon algorithm. The techniques we develop are general: we also use them to give a proof of security of the scrypt and Argon2i password-hashing functions, in the random-oracle model. Our security analysis uses a sequential model of computation, which essentially captures attacks that run on single-core machines. Recent work shows how to use massively parallel special-purpose machines (e.g., with hundreds of cores) to attack memory-hard functions, including Balloon. We discuss these important attacks, which are outside of our adversary model, and propose practical defenses against them. To motivate the need for security proofs in the area of password hashing, we demonstrate and implement a practical attack against Argon2i that successfully evaluates the function with less space than was previously claimed possible. Finally, we use experimental results to compare the performance of the Balloon hashing algorithm to other memory-hard functions.
机译:我们提出了气球密码散列算法。这是第一个实用的加密散列函数:(i)在随机Oracle模型中已证明内存 - 硬度属性,(ii)使用密码无关的访问模式,(iii)达到 - 并且通常超过 - 性能最好的启发式安全密码散列算法。内存 - 硬功能需要大量的工作空间来有效地评估,并且当用于密码散列时,它们大大提高了离线词典攻击的成本。在这项工作中,我们利用了一类图表的先前未捕获的财产(“随机夹心图”),以分析气球算法的内存硬度。我们开发的技术是通用的:我们还用他们给的scrypt和Argon2i密码散列函数的安全性的证明,在随机预言模型。我们的安全分析使用顺序计算模型,从而捕获在单核机器上运行的攻击。最近的工作表明如何使用大规模并行专用机器(例如,带有数百个核心)来攻击内存硬功能,包括气球。我们讨论了这些重要的攻击,这些攻击在我们的对手模式之外,并提出了对他们的实际防御。为了激励对密码散列领域的安全证明的需求,我们向argon2i展示并实施了对argon2i的实际攻击,该攻击成功地评估了比以前索赔的空间更少的函数。最后,我们使用实验结果将气球散列算法与其他内存硬功能进行比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号