Cryptology ePrint Archive: Report 2015/136

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs

Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. L. M. Barreto

Abstract: We present Lyra2, a password hashing scheme (PHS) based on cryptographic sponges. Lyra2 was designed to be strictly sequential (i.e., not easily parallelizable), providing strong security even against attackers that uses multiple processing cores (e.g., custom hardware or a powerful GPU). At the same time, it is very simple to implement in software and allows legitimate users to fine tune its memory and processing costs according to the desired level of security against brute force password-guessing. Lyra2 is an improvement of the recently proposed Lyra algorithm, providing an even higher security level against different attack venues and overcoming some limitations of this and other existing schemes.

Category / Keywords: cryptographic protocols / password hashing, processing time, memory usage, cryptographic sponges.

Original Publication (in the same form): https://password-hashing.net/ and http://dx.doi.org/10.1109/TC.2016.2516011

Date: received 19 Feb 2015, last revised 8 Aug 2016

Contact author: eandrade at larc usp br

Available format(s): PDF | BibTeX Citation

Note: This paper corresponds to version 3 of Lyra2, originally submitted to the Password Hashing Competition (https://password-hashing.net/).

Version: 20160808:184735 (All versions of this report)

Short URL: ia.cr/2015/136

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]