Optimizing a password hashing function with hardware-accelerated symmetric encryption (Q2337862)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Optimizing a password hashing function with hardware-accelerated symmetric encryption |
scientific article; zbMATH DE number 7133846
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Optimizing a password hashing function with hardware-accelerated symmetric encryption |
scientific article; zbMATH DE number 7133846 |
Statements
Optimizing a password hashing function with hardware-accelerated symmetric encryption (English)
0 references
20 November 2019
0 references
Summary: Password-based key derivation functions (PBKDFs) are commonly used to transform user passwords into keys for symmetric encryption, as well as for user authentication, password hashing, and preventing attacks based on custom hardware. We propose two optimized alternatives that enhance the performance of a previously published PBKDF. This design is based on (1) employing a symmetric cipher, the Advanced Encryption Standard (AES), as a pseudo-random generator and (2) taking advantage of the support for the hardware acceleration for AES that is available on many common platforms in order to mitigate common attacks to password-based user authentication systems. We also analyze their security characteristics, establishing that they are equivalent to the security of the core primitive (AES), and we compare their performance with well-known PBKDF algorithms, such as Scrypt and Argon2, with favorable results.
0 references
symmetric
0 references
encryption
0 references
password
0 references
hash
0 references
cryptography
0 references
PBKDF
0 references
0.6833205819129944
0 references
0.6667776703834534
0 references
0.6642419695854187
0 references
0.6519519686698914
0 references
0.6510504484176636
0 references