Paper 2019/044

Toha Key Hardened Function

Ahmad Almorabea

Abstract

TOHA is Key Hardened Function designed in the general spirit of sequential memory- hard function which based on secure cryptographic hash function, the idea behind its design is to make it harder for an attacker to perform some generic attacks and to make it costly as well, TOHA can be used for deriving keys from a master password or generating keys with length of 256-bit to be used in other algorithm schemes, general approach is to use a password and a salt like a normal scheme plus other parameters, and you can think of the salt as an index into a large set of keys derived from the same password, and of course you don’t need to hide the salt to operate.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
key derivationpassword based authenticationKDFAuthentication
Contact author(s)
ahmad @ almorabea net
History
2019-01-25: received
Short URL
https://ia.cr/2019/044
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/044,
      author = {Ahmad Almorabea},
      title = {Toha Key Hardened Function},
      howpublished = {Cryptology ePrint Archive, Paper 2019/044},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/044}},
      url = {https://eprint.iacr.org/2019/044}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.