Cryptology ePrint Archive: Report 2014/881

Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks

Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel

Abstract: In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality, e.g., client-independent update and server relief, their security, e.g., memory-hardness and side-channel resistance, and its general proper- ties, e.g., memory usage and flexibility of the underlying primitives. Furthermore, we formally introduce two kinds of attacks, called Garbage- Collector and Weak Garbage-Collector Attack, exploiting the memory management of a candidate. Note that we consider all candidates which are not yet withdrawn from the competition.

Category / Keywords: Password Hashing Competition, Overview, Garbage-Collector Attacks

Date: received 24 Oct 2014, last revised 15 Jul 2015

Contact author: jakob wenzel at uni-weimar de

Available format(s): PDF | BibTeX Citation

Version: 20150715:083248 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]