Paper 2014/881

Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks

Christian Forler, Eik List, Stefan Lucks, and Jakob Wenzel

Abstract

In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality, e.g., client-independent update and server relief, their security, e.g., memory-hardness and side-channel resistance, and its general proper- ties, e.g., memory usage and flexibility of the underlying primitives. Furthermore, we formally introduce two kinds of attacks, called Garbage- Collector and Weak Garbage-Collector Attack, exploiting the memory management of a candidate. Note that we consider all candidates which are not yet withdrawn from the competition.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Password Hashing CompetitionOverviewGarbage-Collector Attacks
Contact author(s)
jakob wenzel @ uni-weimar de
History
2015-07-15: last of 13 revisions
2014-10-28: received
See all versions
Short URL
https://ia.cr/2014/881
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/881,
      author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel},
      title = {Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks},
      howpublished = {Cryptology ePrint Archive, Paper 2014/881},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/881}},
      url = {https://eprint.iacr.org/2014/881}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.