Ensemble Approach to Failure-Resistant Password-Based Key Derivation Functions

Ensemble Approach to Failure-Resistant Password-Based Key Derivation Functions

Ensemble Approach to Failure-Resistant Password-Based Key Derivation Functions Jason Hennessey, Sarah Scheffler, Mayank Varia Department of Computer Science {henn, sscheff, varia}@bu.edu bu.edu/cs Motivation Construction Example Hash Functions Hardware attacks getting easier Hash Adopted by PBKDF Definition Example Plugins SHA2-512 [11] US/NIST + EU/NESSIE Whirlpool [9] Global/ISO + EU/NESSIE Resource Plugin SHA3-512 [12] US/NIST password Memory scrypt[8], argon2d[4] Steebog-512 [5] Russia/FAPSI BLAKE2-512 [2] Open source projects PBKDF CPU Hash functions salt key Chip/rate limit TPM ChaCha20/Poly1305 [7] Open source projects key length Cache argon2d[4] AES/Poly1305 [3] Open source projects 2017 2017 2017 Network Pythia[6] MD6 [10] Open source projects CPU GPU $2K ASIC 2013 2017 1 ··· ··· ··· ··· $1M ASIC $1M ASIC • PBKDF2[13] (most widespread PBKDF) relies on simple, repeated hash invocations to increase H password key derivation time for attackers • Bitcoin provided a financial incentive to create high F (F (h1k1 , h2k2 ),F (h3k3 , h4k4 )) throughput, efficient hashing ASICs Plugin Plugin Plugin Key Key • Passwords can now be guessed 106 to 1010 times h1 k faster using ASICs than CPUs of similar price k1 1 h2 k • State-of-the-art PBKDFs (e.g. scrypt[8], argon2[4]) k2 2 H H H H H H improve by utilizing memory, but are still vulnerable ··· ··· h3k3 k3 to ASIC attacks [1] h4k4 k4 Goal References Plugins believed to be side- Plugin-running phase Key output phase Minimize efficiency gains of specialized hardware vs. channel vulnerable are run last 1 honest user’s device for key derivation [1] Asic Litecoin/Scrypt Miner Wolf V1 1024 Mh/s (1GH). https://shop.bitmain.com/antminer_l3_litecoin_asic_scrypt_miner.htm. [2] J.-P. Aumasson, S. Neves, Z. Wilcox-O’Hearn, and C. Winnerlein. BLAKE2: Simpler, smaller, fast 1 as MD5. In M. J. Jacobson Jr., M. E. Locasto, P. Mohassel, and R. Safavi-Naini, editors, ACNS 13: 11th International Conference on Applied Cryptography and Network Security, volume 7954 of Properties Lecture Notes in Computer Science, pages 119–135, Banff, AB, Canada, June 25–28, 2013. Springer, Heidelberg, Germany. [3] D. J. Bernstein. The poly1305-AES message-authentication code. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption – FSE 2005, volume 3557 of Lecture Notes in Computer Science, • Resource consumption model - plugins pages 32–49, Paris, France, Feb. 21–23, 2005. Springer, Heidelberg, Germany. plugin list plugin list excluding fi [4] A. Biryukov, D. Dinu, and D. Khovratovich. Argon2: new generation of memory-hard functions for consume user-specified resources (e.g. memory, password hashing and other applications. In Security and Privacy (EuroS&P), 2016 IEEE European CPU, disk) Symposium on, pages 292–302. IEEE, 2016. [5] V. Dolmatov and A. Degtyarev. GOST R 34.11-2012: Hash Function. RFC 6986 (Informational), • Failure resistance - Hash construct guarantees ÝÝÝÝ Aug. 2013. resources [6] A. Everspaugh, R. Chatterjee, S. Scott, A. Juels, T. Ristenpart, and C. Tech. The pythia prf service. In USENIX Security Symposium, pages 547–562, 2015. security as good as strongest hash; failures in scheduler plugin fi [7] A. Langley, W. Chang, N. Mavrogiannopoulos, J. Strombergson, and S. Josefsson. resource-consuming plugins limited to a single round choice of fi ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS). RFC 7905 (Proposed Standard), June 2016. • Optimization for specific platform - Plugin [8] C. Percival and S. Josefsson. The scrypt password-based key derivation function. Technical report, plugin input from hash 2016. and sponge construction designed for anti-pipelining [9] V. Rijmen and P. S. L. M. Barreto. The WHIRLPOOL hash function. H H hash input from plugin [10] R. L. Rivest, B. Agre, D. V. Bailey, C. Crutchfield, Y. Dodis, K. E. Fleming, A. Khan, and anti-parallelism J. Krishnamurthy, Y. Lin, L. Reyzin, et al. The md6 hash function–a proposal to nist for sha-3. Submission to NIST, 2(3), 2008. hash input from previous output [11] Secure hash standard. National Institute of Standards and Technology, NIST FIPS PUB 180-2, U.S. Acknowledgements Department of Commerce, Aug. 2002. [12] Secure hash standard. National Institute of Standards and Technology, NIST FIPS PUB 180-4, U.S. private hash state Department of Commerce, Aug. 2015. We gratefully acknowledge Ethan Heilman’s contributions both to the initial concept and refinements, as well as support received from: NSF Grant No. 1414119, Clare Boothe Luce Graduate Research Fellowship, [13] M. S. Turan, E. Barker, W. Burr, and L. Chen. Recommendation for password-based key derivation. MassTech Collaborative Research Matching Grant Program and commercial partners of the Massachusetts NIST special publication, 800:132, 2010. Open Cloud. @BUCompSci 1.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    1 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us