lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.11.1505041403550.939@debian>
Date: Mon, 4 May 2015 14:19:38 +0200 (CEST)
From: Stefan.Lucks@...-weimar.de
To: "discussions@...sword-hashing.net" <discussions@...sword-hashing.net>
Subject: Re: [PHC] Maximising Pseudo-Entropy versus resistance to Side-Channel
 Attacks

On Thu, 30 Apr 2015, Bill Cox wrote:

> I consider garbage collector attacks to be a more common side-channel than cache-timing.  Yescrypt does a good job overwriting early memory
> fast, so that there's less chance of a devistating garbage collector attack.  I prefer what I did in TwoCats, which minimizes early garbage
> collector attacks by using a Catena-style increasing garlic, up to some reasonable size.

Either attack cache timing and garbage collector, is unlikely to happen, 
and either will eventually catch people not aware of these issues.

I'd consider a password hash function vulnerable to either a time bomb -- 
most of the time, nothing happens, but eventually, someone gets killed.

> As for side-channel resistance, Lyra2 (especially if we enhance it's 
> early walk pattern) has a cache-timing resistant first loop, 
> significantly reducing the damage from a successful cache-timing 
> attack. 

Agreed. Cache-attacks don't allow to significantly speed-up "conventional" 
attacks (by more than a factor of two or four or so).

There is still the issue of enabling an offline-attack, where it would be 
impossible otherwise, because the password file has not been compromised. 
Alexander rightfully pointed out that the adversary needs to know the salt 
for that kind of attack, but see my response to his post.

> Cache timing attacks remain a laboratory experiment,

Not really. See, e.g, <https://eprint.iacr.org/2014/435.pdf>, which 
appears to be a seriuos practical threat to virtual servers.

> Argon2i or Catena as a sole winner would be much worse for defense against these real-world off-line attacks than Scrypt. 

While I don't quite agree with your usage of "much", this is actually the 
reason why I would prefer more than one winner.

> However, I would prefer to have two winners, one from the fast 
> large-memory multi-threaded group (Argon2d, Lyra2, and Yescrypt), and 
> one that is cache-timing attack resistant (either Catena or Argon2i).  
> We could recommend the cache-timing resistant algorithm for algorithms 
> running on VMs which may also be running an attacker's code, and the 
> unpredictable algorithm for full-disk encryption, dedicated 
> authentication servers, and other cases where cache-timing attacks are 
> not likely.

Agreed!

Stefan

------  I  love  the  taste  of  Cryptanalysis  in  the morning!  ------
uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks
--Stefan.Lucks (at) uni-weimar.de, Bauhaus-Universität Weimar, Germany--

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ