Memory-Demanding Password Scrambling
نویسندگان
چکیده
Most of the common password scramblers hinder passwordguessing attacks by “key stretching”, e.g., by iterating a cryptographic hash function many times. With the increasing availability of cheap and massively parallel off-the-shelf hardware, iterating a hash function becomes less and less useful. To defend against attacks based on such hardware, one can exploit their limitations regarding to the amount of fast memory for each single core. The first password scrambler taking this into account was scrypt. In this paper we mount a cache-timing attack on scrypt by exploiting its password-dependent memory-access pattern. Furthermore, we show that it is possible to apply an efficient password filter for scrypt based on a malicious garbage collector. As a remedy, we present a novel password scrambler called Catena which provides both a password-independent memory-access pattern and resistance against garbage-collector attacks. Furthermore, Catena instantiated with the here introduced (G, λ)-DBH operation satisfies a certain time-memory tradeoff called λ-memory-hardness, i.e., using only 1/b the amount of memory, the time necessary to compute the password hash is increased by a factor of b. Finally, we introduce a more efficient instantiation of Catena based on a bit-reversal graph.
منابع مشابه
Catena: A Memory-Consuming Password-Scrambling Framework
It is a common wisdom that servers should store the one-way hash of their clients’ passwords, rather than storing the password in the clear. In this paper we introduce a set of functional properties a key-derivation function (password scrambler) should have. Unfortunately, none of the existing algorithms satisfies our requirements and therefore, we introduce a novel and provably secure password...
متن کاملThe Catena Password - Scrambling Framework 2 nd Round of the Password Hashing Competition ( PHC )
متن کامل
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge Based Authentication Technique with Image Scrambling
Adequate user authentication is a persistent problem, particularly with handheld devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by containing sensitive information, but also by providing the means ...
متن کاملA Theoretical Analysis of One-time Key Based Phase Scrambling for Phase-only Correlation between Visually Protected Images
We present a theoretical analysis of one-time key based phase scrambling for image matching using phase-only correlation (POC). Phase scrambling is used for visual information protection of templates. The effect of scrambling on POC values is analyzed. As a result, the peak value, which is used as a measure of signal congruence, of the POC between nonscrambled signals can be estimated by observ...
متن کاملOne-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images
We present a theoretical analysis of one-time key based phase scrambling for image matching using phase-only correlation (POC). Phase scrambling is used for visual information protection of templates. The effect of scrambling on POC values is analyzed. As a result, the peak value, which is used as a measure of signal congruence, of the POC between nonscrambled signals can be estimated by observ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014