Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Date: December 2014
Publication: 8th International Conference on Passwords (Passwords14 Norway). Lecture Notes in Computer Science, Volume 9393
Page(s): 3 - 18
Source 1: https://eprint.iacr.org/2014/881.pdf
Source 2: http://dx.doi.org/10.1007/978-3-319-24192-0_1 - Subscription or payment required
In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality, e.g., client-independent update and server relief, their security, e.g., memory-hardness and side-channel resistance, and its general properties, e.g., memory usage and flexibility of the underlying primitives. Furthermore, we formally introduce two kinds of attacks, called Garbage-Collector and Weak Garbage-Collector Attack, exploiting the memory management of a candidate. Note that we consider all candidates which are not yet withdrawn from the competition.
PasswordResearch.com Note: Video of presentation available: https://video.adm.ntnu.no/pres/5497c92e6ca0b
Do you have additional information to contribute regarding this research paper? If so, please email email@example.com with the details.