[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1439325270.20150504204126@gmail.com>
Date: Mon, 4 May 2015 20:41:26 +0200
From: Krisztián Pintér <pinterkr@...il.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] Maximising Pseudo-Entropy versus resistance to Side-Channel Attacks
Solar Designer (at Monday, May 4, 2015, 7:52:19 PM):
> The hashing scheme has to be specifically
> designed such that "as long as the salts are not known/predictable by
> the attacker", it is immune to side-channel attacks. And ideally this
> should be easy to see. I think in (ye)scrypt it is easy to see (even
> though in scrypt this probably wasn't a deliberate design goal).
and since there is no 100% side channel proof algorithm, we should
demand this property from all hashes.
submission version gambit was not protected. current version is, since
i implemented the crypto module approach. and i just now recalled that
the lecture that inspired me to do that is exactly about this.
find here http://video.adm.ntnu.no/pres/54980a597dfaf
Sweta Mishra (rig team) - Cryptographic module based approach for
password hashing schemes
Powered by blists - more mailing lists