...
首页> 外文期刊>Journal of information security and applications >Examining PBKDF2 security margin-Case study of LUKS
【24h】

Examining PBKDF2 security margin-Case study of LUKS

机译:审查LUKS的PBKDF2安全保证金案例研究

获取原文
获取原文并翻译 | 示例

摘要

Passwords are widely used to protect our sensitive information or to gain access to specific resources. They should be changed frequently and be strong enough to prevent well-known attacks. Unfortunately, user-chosen passwords are usually short and lack sufficient entropy. A possible solution to these problems is to adopt a Key Derivation Function (KDF) that allows legitimate users to spend a moderate amount of time on key derivation, while imposing CPU/memory-intensive operations on the attacker side. In this paper, we focus on long-term passwords secured by the Password-Based Key Derivation Function 2 (PBKDF2) and present the case study of Linux Unified Key Setup (LUKS), a disk-encryption specification commonly implemented in Linux based operating systems. In particular, we describe how LUKS protects long-term keys by means of iteration counts defined at runtime, and analyze how external factors may affect the iteration counts computation. In doing so, we provide means of evaluating the iteration count values defined at run-time and experimentally show to what level PBKDF2 is still capable of providing sufficient security margin for a LUKS implementation. (C) 2019 Elsevier Ltd. All rights reserved.
机译:密码广泛用于保护我们的敏感信息或访问特定资源。它们应该经常改变,足以防止众所周知的攻击。不幸的是,用户选择的密码通常短而缺乏足够的熵。这些问题的可能解决方案是采用允许合法用户在关键推导下花费适度时间的关键推导函数(KDF),同时对攻击者侧施加CPU /内存密集型操作。在本文中,我们专注于由基于密码的密钥推导函数2(PBKDF2)保护的长期密码,并呈现Linux统一键设置(LUKS)的案例研究,在基于Linux的操作系统中常见的磁盘加密规范。特别是,我们描述了如何通过运行时定义的迭代计数来保护长期键,并分析外部因素如何影响迭代计数计算。在这样做时,我们提供评估在运行时定义的迭代计数值的方法,并通过实验地显示PBKDF2仍然能够为LUK实现提供足够的安全余量。 (c)2019 Elsevier Ltd.保留所有权利。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号