[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAMtf1HuxeVuAnCccEMrPbyfSvKyw7o_6MZL=gmcjUWyjKbWFCQ@mail.gmail.com>
Date: Fri, 24 Apr 2015 06:57:34 +0800
From: Ben Harris <ben@...rr.is>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] (not) protecting password length from side-channels (Re:
[PHC] Argon2 modulo division)
On 24/04/2015 1:38 am, "Bill Cox" <waywardgeek@...il.com> wrote:
>
> On Wed, Apr 22, 2015 at 5:47 PM, Solar Designer <solar@...nwall.com>
wrote:
>>
>> On Wed, Apr 22, 2015 at 09:13:21AM -0700, Bill Cox wrote:
>> > It turns out that there was not a single entry in the competition that
is
>> > power rail analysis resistant
>>
>> ... with respect to password length.
>>
>> I'm with Thomas on this. It is futile for PHC candidates to fully
>> protect the password length.
Isn't the best solution to just hash the password at the source so it is
the same length (it is also incompressible which prevents against another
class of attacks)?
Do any of the second round candidates seem like their power usage side
channel is significant enough for attacks like this
http://www.tau.ac.il/~tromer/acoustic/
Content of type "text/html" skipped
Powered by blists - more mailing lists