lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 24 Apr 2015 06:57:34 +0800
From: Ben Harris <ben@...rr.is>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] (not) protecting password length from side-channels (Re:
 [PHC] Argon2 modulo division)

On 24/04/2015 1:38 am, "Bill Cox" <waywardgeek@...il.com> wrote:
>
> On Wed, Apr 22, 2015 at 5:47 PM, Solar Designer <solar@...nwall.com>
wrote:
>>
>> On Wed, Apr 22, 2015 at 09:13:21AM -0700, Bill Cox wrote:
>> > It turns out that there was not a single entry in the competition that
is
>> > power rail analysis resistant
>>
>> ... with respect to password length.
>>
>> I'm with Thomas on this.  It is futile for PHC candidates to fully
>> protect the password length.

Isn't the best solution to just hash the password at the source so it is
the same length (it is also incompressible which prevents against another
class of attacks)?

Do any of the second round candidates seem like their power usage side
channel is significant enough for attacks like this
http://www.tau.ac.il/~tromer/acoustic/

Content of type "text/html" skipped

Powered by blists - more mailing lists