Useful Password Hashing: How to Waste Computing Cycles with Style
Date: September 2013
Publication: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW '13
Page(s): 31 - 40
Source 1: http://www.nspw.org/papers/2013/nspw2013-durmuth.pdf
Source 2: http://dx.doi.org/10.1145/2535813.2535817 - Subscription or payment required
Abstract or Summary:
Password-based authentication is widely used today, despite problems with security and usability. To control the negative effects of some of these problems, best practice mandates that servers do not store passwords in clear, but password hashes are used. Password hashes slow down the password verification and thus the rate of password guessing in the event of a server compromise. A slower password hash is more secure, as the attacker needs more resources to test password guesses, but at the same time it slows down password verification for the legitimate server. This puts a practical limit on the hardness of the password hash and thus the security of password storage.
We propose a conceptually new method to construct password hashes called "useful" password hashes (UPHs), that do not simply waste computing cycles as other constructions do (e.g., iterating MD5 for several thousand times), but use those cycles to solve other computational problems at the same time, while still being a secure password hash. This way, we are convinced that server operators are willing to use slower password hashes, thus increasing the overall security of password-based authentication.
We give three constructions, based on problems from the field of cryptography: brute-forcing block ciphers, solving discrete logarithms, and factoring integers. These constructions demonstrate that UPHs can be constructed from problems of practical interest, and we are convinced that these constructions can be adapted to a variety of other problems as well.
PasswordResearch.com Note: This YouTube video is from a different conference (PasswordsCon Bergen 2013) but features the author talking about this research: https://www.youtube.com/watch?v=ehHRBbthwSM
Do you have additional information to contribute regarding this research paper? If so, please email email@example.com with the details.