uses SHA-512 2-dimension time cost: sequential & parallel • constant (low) memory • minimalistic and compact design
14
PolyPassHash (Cappos, Arias) uses AES, SHA-256, SSS • threshold of pwds needed to unlock the DB • only appropriate when many users
15
POMELO (Wu) no external primitive (fully original algorithm) • simple FSR-like update functions partial mitigation of cache-timing attacks compact self-contained implementations
16
Pufferfish (Gosney) uses Blowfish, HMAC-SHA-512 • tweaked Blowfish (pwd-dependent S-boxes, etc.) a modern bcrypt (64-bit, variable memory) • JTR patches available
17
RIG (Chang, Jati, Mishra, Sanadhya) uses BLAKE2b • bit-reversal permutation mitigation of cache-timing leaks supports server relief and hash upgrade
18
Tortuga (Sch) uses Turtle (Blaze, 1996) as permutation keyed sponge structure (absorb/squeeze) original and simple construction
19
Yarn (Capun) • uses AES round and BLAKE2b • parallelism parameterizable 3 "time" parameters for distinct resources simple and compact design
20
yescrypt (Peslyak a.k.a. Solar Designer) uses scrypt with optional tweaks (via bit flags) • optional: local ROM, Salsa20 replacement more parallelism options (thread and inst. level) • supports serve…
21
evaluation criteria security (pseudorandomness, etc.) efficiency ratio (e.g. CPU vs GPU) simplicity (#LOCs, dependencies, etc.) extra functionalities target application etc.
22
we need reviews of the implementations third-party implementations (to check consistency with the specs, etc.) cryptanalysis (memory bypass, side-channel attacks, etc.) any comment or suggestion to i…
Description:
Explore the candidates for Password Hashing Competition (PHC) in this conference talk by JP Aumasson. Dive into the details of various password hashing algorithms, including Antcrypt, Argon, battcrypt, Catena, Centrifuge, Gambit, Lanarea, Lyra2, Omega Crypt, PolyPassHash, POMELO, Pufferfish, RIG, Tortuga, Yarn, and yescrypt. Learn about their unique features, cryptographic primitives used, memory and time parameters, and security considerations. Gain insights into the evaluation criteria for these algorithms, including security, efficiency ratio, simplicity, and extra functionalities. Understand the importance of third-party implementations and cryptanalysis in assessing the strength of these password hashing solutions.
The Candidates for Password Hashing Competition - JP Aumasson