Password-Hashing Status

作者: George Hatzivasilis

DOI: 10.3390/CRYPTOGRAPHY1020010

关键词:

摘要: Computers are used in our everyday activities, with high volumes of users accessing provided services. One-factor authentication consisting a username and password is the common choice to authenticate web. However, poor management practices exploited by attackers that disclose users’ credentials, harming both vendors. In most these occasions user data were stored clear or just processed cryptographic hash function. Password-hashing techniques applied fortify this user-related information. The standardized primitive currently PBKDF2 while other widely-used schemes include Bcrypt Scrypt. evolution parallel computing enables several attacks password-hash cracking. international community conducted Password Hashing Competition (PHC) identify new efficient more secure password-hashing schemes, suitable for widespread adoption. PHC advanced knowledge password-hashing. Further analysis efforts revealed security weaknesses novel designed afterwards. This paper provides review until first quarter 2017 relevant performance evaluation on setting terms code size, memory consumption, execution time.

参考文章(60)
Ahmed Patel, Rosdiadee Nordin, Ahmed Al-Haiqi, Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy Computer Standards & Interfaces. ,vol. 36, pp. 844- 854 ,(2014) , 10.1016/J.CSI.2014.01.003
Dinakar Dhurjati, Sumant Kowshik, Vikram Adve, Chris Lattner, Memory safety without garbage collection for embedded applications ACM Transactions in Embedded Computing Systems. ,vol. 4, pp. 73- 111 ,(2005) , 10.1145/1053271.1053275
Joël Alwen, Vladimir Serbinenko, High Parallel Complexity Graphs and Memory-Hard Functions symposium on the theory of computing. pp. 595- 603 ,(2015) , 10.1145/2746539.2746622
George Hatzivasilis, Charalampos Manifavas, Building Trust in Ad Hoc Distributed Resource-Sharing Networks Using Reputation-Based Systems panhellenic conference on informatics. pp. 416- 421 ,(2012) , 10.1109/PCI.2012.28
Yi-Pin Liao, Shuenn-Shyang Wang, A secure dynamic ID based remote user authentication scheme for multi-server environment Computer Standards & Interfaces. ,vol. 31, pp. 24- 29 ,(2009) , 10.1016/J.CSI.2007.10.007
Dong-Rui Fan, Xiao-Wei Li, Guo-Jie Li, New Methodologies for Parallel Architecture Journal of Computer Science and Technology. ,vol. 26, pp. 578- 587 ,(2011) , 10.1007/S11390-011-1158-Z
Tolga Acar, Mira Belenkiy, Alptekin Küpçü, Single password authentication Computer Networks. ,vol. 57, pp. 2597- 2614 ,(2013) , 10.1016/J.COMNET.2013.05.007
N. Sklavos, O. Koufopavlou, Implementation of the SHA-2 Hash Family Standard Using FPGAs The Journal of Supercomputing. ,vol. 31, pp. 227- 248 ,(2005) , 10.1007/S11227-005-0086-5
Gianluca Dini, Ida M. Savino, LARK ACM Transactions on Embedded Computing Systems. ,vol. 10, pp. 1- 35 ,(2011) , 10.1145/2043662.2043665
Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Nicolas Sklavos, Key management systems for sensor networks in the context of the Internet of Things Computers & Electrical Engineering. ,vol. 37, pp. 147- 159 ,(2011) , 10.1016/J.COMPELECENG.2011.01.009