Abstract
A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for password hashing. This paper shows that the particular matrix-multiplication hash function used in the challenge is much less secure than previous password-hashing functions are believed to be. This paper’s attack algorithm broke the challenge in just 19 minutes using a cluster of 21 PCs.
Original language | English |
---|---|
Title of host publication | Information Security and Privacy |
Subtitle of host publication | 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings |
Editors | E. Foo, D. Stebila |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 488-508 |
Number of pages | 21 |
ISBN (Print) | 9783319199610 |
DOIs | |
Publication status | Published - 2015 |
Event | 20th Australasian Conference on Information Security and Privacy (ACISP 2015), June 29-July 1, 2015, Brisbane, Australia - Queensland University of Technology, Brisbane, Australia Duration: 29 Jun 2015 → 1 Jul 2015 http://acisp2015.qut.edu.au/ |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 9144 |
ISSN (Print) | 03029743 |
ISSN (Electronic) | 16113349 |
Conference
Conference | 20th Australasian Conference on Information Security and Privacy (ACISP 2015), June 29-July 1, 2015, Brisbane, Australia |
---|---|
Abbreviated title | ACISP 2015 |
Country/Territory | Australia |
City | Brisbane |
Period | 29/06/15 → 1/07/15 |
Internet address |
Keywords
- Hash functions
- Matrix multiplication
- Meet-in-many-middles attacks
- Meet-in-the-middle attacks
- Password hashing
- Point obfuscation
- Symmetric cryptography