Paper 2014/881
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Christian Forler, Eik List, Stefan Lucks, and Jakob Wenzel
Abstract
In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality, e.g., client-independent update and server relief, their security, e.g., memory-hardness and side-channel resistance, and its general proper- ties, e.g., memory usage and flexibility of the underlying primitives. Furthermore, we formally introduce two kinds of attacks, called Garbage- Collector and Weak Garbage-Collector Attack, exploiting the memory management of a candidate. Note that we consider all candidates which are not yet withdrawn from the competition.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Password Hashing CompetitionOverviewGarbage-Collector Attacks
- Contact author(s)
- jakob wenzel @ uni-weimar de
- History
- 2015-07-15: last of 13 revisions
- 2014-10-28: received
- See all versions
- Short URL
- https://ia.cr/2014/881
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/881, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/881}, year = {2014}, url = {https://eprint.iacr.org/2014/881} }