Skip to main content
Erschienen in: Journal of Cryptographic Engineering 2/2014

01.06.2014 | Regular Paper

Lyra: password-based key derivation with tunable memory and processing costs

verfasst von: Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplicio Jr

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We present Lyra, a password-based key derivation scheme based on cryptographic sponges. Lyra was designed to be strictly sequential (i.e., not easily parallelizable), providing strong security even against attackers that use multiple processing cores (e.g., custom hardware or a powerful GPU). At the same time, it is very simple to implement in software and allows legitimate users to fine-tune its memory and processing costs according to the desired level of security against brute force password guessing. We compare Lyra with similar-purpose state-of-the-art solutions, showing how our proposal provides a higher security level and overcomes limitations of existing schemes. Specifically, we show that if we fix Lyra ’s total processing time \(t\) in a legitimate platform, the cost of a memory-free attack against the algorithm is exponential, while the best-known result in the literature (namely, against the scrypt algorithm) is quadratic. In addition, for an identical same processing time, Lyra allows for a higher memory usage than its counterparts, further increasing the cost of brute force attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Andreeva, E., Mennink, B., Preneel, B.: The Parazoa family: generalizing the Sponge hash functions. IACR Cryptol. ePrint Arch. 2011, 28 (2011) Andreeva, E., Mennink, B., Preneel, B.: The Parazoa family: generalizing the Sponge hash functions. IACR Cryptol. ePrint Arch. 2011, 28 (2011)
3.
Zurück zum Zitat Aumasson, J.P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of latin dances: Analysis of Salsa, ChaCha, and Rumba. In: Fast Software Encryption, vol. 5084, pp. 470–488. Springer, Berlin (2008). doi:10.1007/978-3-540-71039-4_30 Aumasson, J.P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of latin dances: Analysis of Salsa, ChaCha, and Rumba. In: Fast Software Encryption, vol. 5084, pp. 470–488. Springer, Berlin (2008). doi:10.​1007/​978-3-540-71039-4_​30
6.
Zurück zum Zitat Bellare, M., Ristenpart, T., Tessaro, S.: Multi-instance security and its application to password-based cryptography. In: Advances in Cryptology (CRYPTO 2012), LNCS, vol. 7417, pp. 312–329. Springer, Berlin (2012). doi:10.1007/978-3-642-32009-19 Bellare, M., Ristenpart, T., Tessaro, S.: Multi-instance security and its application to password-based cryptography. In: Advances in Cryptology (CRYPTO 2012), LNCS, vol. 7417, pp. 312–329. Springer, Berlin (2012). doi:10.​1007/​978-3-642-32009-19
7.
11.
Zurück zum Zitat Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on Security and Privacy, pp. 553–567 (2012). doi:10.1109/SP.2012.44 Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on Security and Privacy, pp. 553–567 (2012). doi:10.​1109/​SP.​2012.​44
14.
Zurück zum Zitat Chung, E.S., Milder, P.A., Hoe, J.C., Mai, K.: Single-chip heterogeneous computing: Does the future include custom logic, FPGAs, and GPGPUs? In: Proc. of the 43rd Annual IEEE/ACM International Symposium on Microarchitecture, MICRO’43, pp. 225–236. IEEE Computer Society, Washington, DC (2010). doi:10.1109/MICRO.2010.36 Chung, E.S., Milder, P.A., Hoe, J.C., Mai, K.: Single-chip heterogeneous computing: Does the future include custom logic, FPGAs, and GPGPUs? In: Proc. of the 43rd Annual IEEE/ACM International Symposium on Microarchitecture, MICRO’43, pp. 225–236. IEEE Computer Society, Washington, DC (2010). doi:10.​1109/​MICRO.​2010.​36
15.
17.
Zurück zum Zitat Daemen, J., Rijmen, V.: A new MAC construction alred and a specific instance alpha-mac. In: Fast Software Encryption—FSE’05, pp. 1–17 (2005). doi:10.1007/11502760_1 Daemen, J., Rijmen, V.: A new MAC construction alred and a specific instance alpha-mac. In: Fast Software Encryption—FSE’05, pp. 1–17 (2005). doi:10.​1007/​11502760_​1
18.
Zurück zum Zitat Daemen, J., Rijmen, V.: Refinements of the alred construction and MAC security claims. Inf. Secur. IET 4(3), 149–157 (2010). doi:10.1049/iet-ifs. 2010.0015CrossRef Daemen, J., Rijmen, V.: Refinements of the alred construction and MAC security claims. Inf. Secur. IET 4(3), 149–157 (2010). doi:10.​1049/​iet-ifs. 2010.0015CrossRef
19.
Zurück zum Zitat Dandass, Y.S.: Using FPGAs to parallelize dictionary attacks for password cracking. In: Proc. of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), pp. 485–485. IEEE (2008). doi:10.1109/HICSS.2008.484 Dandass, Y.S.: Using FPGAs to parallelize dictionary attacks for password cracking. In: Proc. of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), pp. 485–485. IEEE (2008). doi:10.​1109/​HICSS.​2008.​484
20.
Zurück zum Zitat Dürmuth, M., Güneysu, T., Kasper, M.: Evaluation of standardized password-based key derivation against parallel processing platforms. In: Computer Security-ESORICS 2012, LNCS, vol. 7459, pp. 716–733. Springer, Berlin (2012). doi:10.1007/978-3-642-33167-1_41 Dürmuth, M., Güneysu, T., Kasper, M.: Evaluation of standardized password-based key derivation against parallel processing platforms. In: Computer Security-ESORICS 2012, LNCS, vol. 7459, pp. 716–733. Springer, Berlin (2012). doi:10.​1007/​978-3-642-33167-1_​41
21.
Zurück zum Zitat Florencio, D., Herley, C.: A large scale study of web password habits. Proc. of the 16th International Conference on World Wide Web. Alberta, pp. 657–666 (2007) Florencio, D., Herley, C.: A large scale study of web password habits. Proc. of the 16th International Conference on World Wide Web. Alberta, pp. 657–666 (2007)
22.
Zurück zum Zitat Fowers, J., Brown, G., Cooke, P., Stitt, G.: A performance and energy comparison of FPGAs, GPUs, and multicores for sliding-window applications. In: Proceedings of the ACM/SIGDA Internbational Symposium on Field Programmable Gate Arrays (FPGA’12), pp. 47–56. ACM, New York (2012). doi:10.1145/2145694.2145704 Fowers, J., Brown, G., Cooke, P., Stitt, G.: A performance and energy comparison of FPGAs, GPUs, and multicores for sliding-window applications. In: Proceedings of the ACM/SIGDA Internbational Symposium on Field Programmable Gate Arrays (FPGA’12), pp. 47–56. ACM, New York (2012). doi:10.​1145/​2145694.​2145704
23.
Zurück zum Zitat Halderman, J., Schoen, S., Heninger, N., Clarkson, W., Paul, W., Calandrino, J., Feldman, A., Appelbaum, J., Felten, E.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009). doi:10.1145/1506409.1506429 CrossRef Halderman, J., Schoen, S., Heninger, N., Clarkson, W., Paul, W., Calandrino, J., Feldman, A., Appelbaum, J., Felten, E.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009). doi:10.​1145/​1506409.​1506429 CrossRef
24.
Zurück zum Zitat Herley, C., van Oorschot, P., Patrick, A.: Passwords: If we’re so smart, why are we still using them? In: Financial Cryptography and Data Security, LNCS, vol. 5628, pp. 230–237. Springer, Berlin (2009). doi:10.1007/978-3-642-03549-4_14 Herley, C., van Oorschot, P., Patrick, A.: Passwords: If we’re so smart, why are we still using them? In: Financial Cryptography and Data Security, LNCS, vol. 5628, pp. 230–237. Springer, Berlin (2009). doi:10.​1007/​978-3-642-03549-4_​14
25.
Zurück zum Zitat Kakarountas, A.P., Michail, H., Milidonis, A., Goutis, C.E., Theodoridis, G.: High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applications. J. Supercomput. 37(2), 179–195 (2006). doi:10.1007/s11227-006-5682-5 CrossRef Kakarountas, A.P., Michail, H., Milidonis, A., Goutis, C.E., Theodoridis, G.: High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applications. J. Supercomput. 37(2), 179–195 (2006). doi:10.​1007/​s11227-006-5682-5 CrossRef
27.
Zurück zum Zitat Kelsey, J., Schneier, B., Hall, C., Wagner, D.: Secure applications of low-entropy keys. In: Proceedings of the 1st International Workshop on Information Security, ISW ’97, pp. 121–134. Springer, London (1998) Kelsey, J., Schneier, B., Hall, C., Wagner, D.: Secure applications of low-entropy keys. In: Proceedings of the 1st International Workshop on Information Security, ISW ’97, pp. 121–134. Springer, London (1998)
28.
Zurück zum Zitat Khronos Group: The OpenCL specification—version 1.2 (2012) Khronos Group: The OpenCL specification—version 1.2 (2012)
38.
Zurück zum Zitat Provos, N., Mazières, D.: A future-adaptable password scheme. In: Proceedings of the FREENIX track: 1999 USENIX Annual Technical Conference (1999) Provos, N., Mazières, D.: A future-adaptable password scheme. In: Proceedings of the FREENIX track: 1999 USENIX Annual Technical Conference (1999)
39.
Zurück zum Zitat Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). Fast Software Encryption, pp. 191–204. Cambridge Security Workshop. Springer, London (1994) Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). Fast Software Encryption, pp. 191–204. Cambridge Security Workshop. Springer, London (1994)
42.
Zurück zum Zitat Simplicio Jr, M.A., Barbuda, P., Barreto, P., Carvalho, T., Margi, C.: The marvin message authentication code and the lettersoup authenticated encryption scheme. Secur. Commun. Netw. 2, 165–180 (2009). doi:10.1002/sec.66 Simplicio Jr, M.A., Barbuda, P., Barreto, P., Carvalho, T., Margi, C.: The marvin message authentication code and the lettersoup authenticated encryption scheme. Secur. Commun. Netw. 2, 165–180 (2009). doi:10.​1002/​sec.​66
47.
Zurück zum Zitat Weir, M., Aggarwal, S., Medeiros, B.d., Glodek, B.: Password cracking using probabilistic context-free grammars. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, SP’09, pp. 391–405. IEEE Computer Society, Washington, DC (2009). doi:10.1109/SP.2009.8 Weir, M., Aggarwal, S., Medeiros, B.d., Glodek, B.: Password cracking using probabilistic context-free grammars. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, SP’09, pp. 391–405. IEEE Computer Society, Washington, DC (2009). doi:10.​1109/​SP.​2009.​8
49.
Zurück zum Zitat Yuill, J., Denning, D., Feer, F.: Using deception to hide things from hackers: processes, principles, and techniques. J. Inf. Warfare 5(3), 26–40 (2006) Yuill, J., Denning, D., Feer, F.: Using deception to hide things from hackers: processes, principles, and techniques. J. Inf. Warfare 5(3), 26–40 (2006)
Metadaten
Titel
Lyra: password-based key derivation with tunable memory and processing costs
verfasst von
Leonardo C. Almeida
Ewerton R. Andrade
Paulo S. L. M. Barreto
Marcos A. Simplicio Jr
Publikationsdatum
01.06.2014
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 2/2014
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-013-0063-5

Weitere Artikel der Ausgabe 2/2014

Journal of Cryptographic Engineering 2/2014 Zur Ausgabe

Premium Partner