Two Provably Secure Password Hashing Algorithms

Two Provably Secure Password Hashing Algorithms

Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {bo.zhu,x5fan,ggong}@uwaterloo.ca ABSTRACT are two fundamental limitations of password-based authen- Password-based authentication has been widely deployed in tication: 1) Users routinely pick poor passwords which are practice due to its simplicity and efficiency. Storing pass- particularly subject to dictionary attacks or brute-force search; words and deriving cryptographic keys from passwords in and 2) A device or server storing a large number of passwords a secure manner are crucial for many security systems and is consistently a juicy target for attackers, and how to store services. However, choices of well-studied password hashing passwords securely and minimize damages if the device or algorithms are extremely limited, as their security require- server has been breached is non-trivial. As an effective coun- ments and design principles are different from common cryp- termeasure, all passwords should be obscured together with tographic algorithms. In this paper, we propose two practi- user-specific, random and high-entropy salts by applying a cal password hashing algorithms, Pleco and Plectron. one-way function, namely password hashing, before storing They are built upon well-understood cryptographic algo- them in the device or server. During authentication, the rithms, and combine advantages of symmetric and asymmet- user's input is processed in the same way and then the re- ric primitives. By employing the Rabin cryptosystem, we sult is compared with the one stored in the device or server. prove that the one-wayness of Pleco is at least as strong as the hard problem of integer factorization. In addition, both Password hashing is one of the most basic security considera- password hashing algorithms are designed to be sequential tions for setting up a password-based authentication system, memory-hard, in order to thwart large-scale password crack- and there are several requirements that a good password ing by parallel hardware, such as GPUs, FPGAs, and ASICs. hashing algorithm should fulfill: Moreover, total computation and memory consumptions of Pleco and Plectron are tunable through their cost pa- rameters. • Similar as most cryptographic primitives, the password hashing algorithm should behave as a random function that ensures one-wayness and collision resistance, and Categories and Subject Descriptors is resistant to side-channel attacks as well as known K.6.5 [Management of Computing and Information cryptanalytic technologies such as time-memory trade- Systems]: Security and Protection|Authentication; D.4.6 off [10, 14], differential/linear cryptanalysis [7, 18]; [Operating Systems]: Security and Protection|authenti- cation, cryptographic controls • Different from most cryptographic primitives, the pass- word hashing algorithm should be heavyweight in com- General Terms putation and memory usage to slow down brute-force Security, Algorithm attacks to a certain degree and make large-scale at- tacks economically difficult. Note that the desired heavyweightness is expected to be roughly consistent Keywords for all platforms, no matter software or hardware; Password, hashing, login, authentication • Server-specific shortcut is an optional but very attrac- 1. INTRODUCTION tive feature for a password hashing scheme. Once Password-based authentication is probably the most widely this feature is enabled and certain private informa- deployed security mechanism across all information systems tion is known, legitimate servers or devices can obscure thanks to its cost-effectiveness and efficiency. However, there passwords by using less computation (server-specific computational shortcut) and/or less memory (server- specific memory shortcut). Although password hashing is the foundation of many real- world security systems and services, there are only limited proposals well studied and adopted, due to the aforemen- tioned uncommon and demanding requirements. PBKDF2, which is a key derivation function designed by RSA Labora- tories and standardized in RFC 2898 [15], has been the sub- ject of extensive research and still remains the best conser- 2.1 Provably One-Way Function vative choice. PBKDF2 is a conventional design that mainly It is proven that the security of the Rabin public-key en- relies on iterating a pseudorandom function (usually HMAC- cryption scheme is equivalent to the hard problem of integer SHA1) a certain number of times. However, the iterative factorization [26]. More theoretically, let us define design leads to quite unaggressive usage of memory, which 2 makes large-scale and parallel cracking possible [11]. bcrypt Rabinn(x) = x (mod n); is designed by Provos and Mazi`eres [25], based on the Blow- where x is a positive integer in the multiplicative group of fish cipher [29] with a purposefully expensive key schedule. integers modulo n. Then computing the square roots, i.e., Thanks to the adaptive iteration count that can be increased reversing the function Rabinn(x), is proven to be equivalent to make it slower, bcrypt could remain resistant to brute- to factorizing the integer n. force search attacks even with vast increases in computing power. Like PBKDF2, bcrypt works in-place in memory and To obtain a hard-to-factor modulus n, one can utilize the performs poorly towards thwarting attacks using dedicated same approach as generating moduli for the RSA algorithm, hardware. scrypt, designed by Percival [23], is a proposal i.e., randomly generating two large prime numbers p and q, which not only offers stronger security from a theoretical and using their product n = p · q as a modulus. The other point of view than the other two but also allows one to approach is to choose certain large composite numbers with configure the amount of space in memory required to effi- unknown factorization, e.g., the Mersenne composite num- ciently complete the algorithm. The customizable memory ber used in Shamir's SQUASH construction [31]. More about requirement makes it difficult for attackers to build large- publicly auditable moduli will be discussed in Section 5.2. scale cracking circuits for scrypt, since these dedicated hard- ware usually have very constrained memory. The design 2.2 Sponge-Based Hash Function of scrypt has been extensively evaluated when scrypt was Keccak, which is designed by Bertoni, Daemen, Peeters, selected as the underlying proof-of-work function for many and Van Assche [5], is the winner of the SHA-3 crypto- cryptocurrencies, e.g., Litecoin and Dogecoin. graphic hash function competition held by NIST [21]. Kec- cak is based on a unique construction, namely sponge con- 1.1 Our Contributions struction, which can absorb an arbitrary-length binary string In this paper, we propose two novel password hashing algo- as input, and then squeeze out a binary string of any required rithms, named Pleco and Plectron, respectively, based length as output. upon several well-studied cryptographic structures and prim- itives. The novelty in the designs of Pleco and Plec- In our password hashing designs, Keccak is adopted to: tron is the combination of asymmetric and symmetric com- ponents that offers a twofold benefit: 1) Since the tools • Fully mix password and salt strings; to cryptanalyzing asymmetric algorithms are quite different from those for symmetric ones, the composition of asymmet- • Expand short input strings to the large space of the ric and symmetric components will make cryptanalysis much Rabin encryption scheme; harder. This is analogous to the designs of ARX based cryp- tographic primitives [1, 4, 20] and the block cipher IDEA [16] • Alternately apply to intermediate states with the Ra- where mixed operations are used; 2) The asymmetric com- bin encryption scheme (or other public-key schemes) ponent not only makes our scheme provably secure (the se- to gain more cryptanalytic strength. curity of Pleco is as strong as the hard problem of integer • May process the final state to produce hash tags of factorization), but also enables server-specific computational required lengths. shortcuts as a result of faster exponentiation via the Chinese Remainder Theorem when factors of moduli are known. In addition to describing the Pleco and Plectron designs in If not specified, default parameters of Keccak should be great detail, we also theoretically prove their security with used, i.e., r = 1024 and c = 576. respect to one-wayness and collision resistance. 2.3 Sequential Memory-Hard Construction 1.2 Organization The password-based key derivation function scrypt was pro- posed by Percival in order to thwart parallel brute-force at- The organization of the paper is as follows. Section 2 de- tacks using GPUs, FPGAs or ASIC chips on passwords, and scribes the cryptographic primitives that Pleco and Plec- has been widely used by cryptocurrencies. One of core com- tron employ. The designs of Pleco and Plectron are ponents of scrypt, namely ROMix, is proven to be sequential specified in Section 3. We discuss the design rationale and memory-hard. One important feature of being sequential provide the security analysis of Pleco and Plectron in memory-hard is that parallel algorithms cannot asymptoti- Section 4. We also propose several extensions of the new cally achieve efficiency advantage than non-parallel ones [23]. hashing algorithms in Section 5, followed by the efficiency In other words, brute-force password search by using ded- analysis in Section 6. We discuss the related work in Section icated hardware with constrained memory, such as GPUs, 7 and finally conclude this paper in Section 8. FPGAs, and ASICs, would not be significantly faster than a single-core desktop computer. For a more detailed definition 2. INGREDIENTS OF PLECO/PLECTRON of sequential memory-hard, the reader is referred to [23]. This section briefly describes several cryptographic primi- tives, which are the core components in the designs of Pleco We list ROMix in Algorithm 1 since it is highly relevant to and Plectron. our designs of Pleco and Plectron.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us