lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20140501130858.GA32442@bolet.org>
Date: Thu, 1 May 2014 15:08:58 +0200
From: Thomas Pornin <pornin@...et.org>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] on timing attacks

On Thu, May 01, 2014 at 08:45:07AM +0400, Solar Designer wrote:
> Historically, salts haven't been considered secret, but there's this
> precomputation attack and there are timing attacks on comparison of
> hashes (of course, it can also be dealt with by using a constant-time
> comparison function, if one is available or can be implemented).  Now
> side-channel attacks on hash functions themselves are added to these two
> attack categories, for a total of three (or are there more?)
> 
> I think it's fair game to assume or stipulate that salts, while not
> secret for purposes of possible offline attacks, are stored along with
> the hashes and are not revealed separately, except if mandated by the
> protocol (such as for server relief), in which case some security
> tradeoffs are accepted (and need to be understood and possibly mitigated
> by other means).

I think it is my cue to point out that with Makwa, the delegation allows
to offload the bulk of the computation to an untrusted system (who can
be the client itself) without revealing anything, in particular without
giving away the salt. And, more generally, since the system to which
computation is delegated does not receive anything secret, it cannot
leak any secret either.

There can be side-channel leaks on the source system -- the server --
but since that system does not have to do the heavy computational work,
suboptimal but leak-safe implementation techniques can be used. In a
basic Makwa implementation, the password _length_ may leak, but not the
password contents, and that's for a one-shot initial operation which is
done within microseconds, so the attack window is not wide.


	--Thomas Pornin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ