lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 24 Apr 2015 06:57:34 +0800
From: Ben Harris <ben@...rr.is>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] (not) protecting password length from side-channels (Re:
[PHC] Argon2 modulo division)
On 24/04/2015 1:38 am, "Bill Cox" <waywardgeek@...il.com> wrote:
>
> On Wed, Apr 22, 2015 at 5:47 PM, Solar Designer <solar@...nwall.com>
wrote:
>>
>> On Wed, Apr 22, 2015 at 09:13:21AM -0700, Bill Cox wrote:
>> > It turns out that there was not a single entry in the competition that
is
>> > power rail analysis resistant
>>
>> ... with respect to password length.
>>
>> I'm with Thomas on this. It is futile for PHC candidates to fully
>> protect the password length.
Isn't the best solution to just hash the password at the source so it is
the same length (it is also incompressible which prevents against another
class of attacks)?
Do any of the second round candidates seem like their power usage side
channel is significant enough for attacks like this
http://www.tau.ac.il/~tromer/acoustic/
Content of type "text/html" skipped
Powered by blists - more mailing lists