Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134031
|View full text |Cite
|
Sign up to set email alerts
|

Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 41 publications
(36 citation statements)
references
References 2 publications
0
36
0
Order By: Relevance
“…While solid options for password hashing and keyderivation exist [9], [8], [18], [87] the reality is that many organizations and developers select suboptimal password hashing functions [92], [19]. Thus, there is a clear need to provide developers with clear guidance about selecting secure password hash functions.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…While solid options for password hashing and keyderivation exist [9], [8], [18], [87] the reality is that many organizations and developers select suboptimal password hashing functions [92], [19]. Thus, there is a clear need to provide developers with clear guidance about selecting secure password hash functions.…”
Section: Discussionmentioning
confidence: 99%
“…These functions have a data access pattern independent of the input. Multiple attacks have been shown in several iMHFs [30], [84], [31], [85], [86], [87], [88]. Data dependent MHFs such as SCRYPT [9] have the previously mentioned side-channel vulnerabilities.…”
Section: Data (In)dependent Memory Hard Functionsmentioning
confidence: 99%
“…In fact, our results only establish worst case hardness of graph pebbling. We cannot rule out the existance of efficient algorithms to find optimal pebblings for practical iMHF proposals such as Argon2i [BDK16] and DRSample [ABH17]. The primary remaining challenge is to either give an efficient α-approximation algorithm to find a pebbling P ∈ P with cc(P ) ≤ αΠ cc (G) or show that Π cc (G) is hard to approximate.…”
Section: Discussionmentioning
confidence: 99%
“…However, they could not rule out the possibility that more efficient attacks might exist 4 . As it stands, there is a huge gap between the best known upper/lower bounds on Π cc (G) for Argon2i and for the new DRSample graph [ABH17], since in all practical cases the ratio between the upper bound and the lower bound is at least 10 5 . An efficient algorithm to (approximately) compute Π cc (G) would allow us to immediately resolve such debates by automatically generating upper/lower bounds on the cost of computing the iMHF for each running time parameters (n) that one might select in practice.…”
Section: Motivationmentioning
confidence: 99%
“…Our PIE is a graph-based file transformation. It depends on a new construct we call a Dagwood Sandwich Graph (DSaG), 2 an iterated interleaving of a depth-robust graph (DRG) with a superconcentrator [53]. Intuitively, a DRG is a directed acyclic graph that retains a long path even if an adversary removes a many nodes.…”
Section: A Public Incompressible Encoding (Pie)mentioning
confidence: 99%