首页> 外文期刊>International Journal of Information Security >Cryptanalytic time-memory trade-off for password hashing schemes
【24h】

Cryptanalytic time-memory trade-off for password hashing schemes

机译:密码散列方案的密码分析时间内存折衷

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Increasing threat of password leakage from compromised password hashes demands a resource consuming password-hashing algorithm to prevent the precomputation of the password hashes. A class of password-hashing schemes (PHS) provides such a defense by making the design Memory hard. This ensures that any reduction in the memory consumed by the algorithm leads to an exponential increase in its runtime. The security offered by a memory-hard PHS design is measured in terms of its time-memory trade-off (TMTO) defense. Another important measure for a good PHS is its efficiency in utilizing all the available memory as quickly as possible, and fast running time when more than the required memory is available. In this work, we present a simple technique to analyze TMTO for a password-hashing scheme which can be represented as a directed acyclic graph (DAG). The nodes of the DAG correspond to the storage required by the algorithm and the edges correspond to the flow of the execution. Our proposed technique provides expected runtimes at varied levels of available storage utilizing the DAG representation of the algorithm. We show the effectiveness of our proposed technique by applying it on three designs from the Password Hashing Competition" (PHC)Argon2-Version1.2.1 (the PHC winner), Catena-Version3.2 and Rig-Version2. Our analysis shows that Argon2i is not providing expected memory hardness which is also highlighted in a recent work by Corrigan-Gibbs et al. We analyze these PHS for performance under various settings of time and memory complexities. Our experimental results show (i) simple DAGs for PHS are efficient but not memory hard, (ii) complex DAGs for PHS are memory hard but less efficient, and (iii) combination of two simple graphs in the representation of a DAG for PHS achieves both memory hardness and efficiency.
机译:从受损密码丢失的密码泄露的威胁需要越来越多的密码泄露需要资源消耗密码散列算法,以防止密码哈希的预先追踪。一类密码散列方案(PHS)通过使设计内存很难来提供这样的防御。这确保了算法消耗的内存中的任何减少导致其运行时的指数增加。内存 - 硬PHS设计提供的安全性在于其时间内存折衷(TMTO)防御来衡量。良好PHS的另一个重要措施是它在利用所有可用内存尽可能快地使用所有可用内存,并且在多于所需的内存时快速运行时间。在这项工作中,我们介绍了一种简单的技术来分析TMTO,用于密码散列方案,其可以表示为定向的非线性图形(DAG)。 DAG的节点对应于算法所需的存储器,并且边缘对应于执行的流程。我们所提出的技术在利用算法的DAG表示提供了各种可用存储水平的预期运行时间。我们通过在密码散列竞争中的三个设计中展示了我们提出的技术的有效性“(PHC)argon2-version1.2.1(PHC获奖者),Catena-Version3.2和Rig-Version2。我们的分析表明Argon2i是没有提供预期的记忆硬度,这些内存硬度也在最近的工作中突出显示了Corrigan-Gibbs等。我们在各种时间和内存复杂性设置下分析了这些pH。我们的实验结果表明(i)PHS的简单DAG是有效的,但不是Memory Hard,(ii)pHS的复杂DAG是内存硬但是效率较低,并且(III)两个简单的图表在DAG的表示中的两个简单图表组合了PHS的内存硬度和效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号