Feeds

The Great Hash Bakeoff: Infosec bods cook up next-gen crypto

Take a serverful of hash, add salt, hold the rainbow

The Essential Guide to IT Transformation

Cryptographers are limbering up for a competition aimed at developing a next-generation password hash to create a better means for websites to store users' login credentials.

In total 24 submissions have been made to the Password Hashing Competition. Cryptographers will now test the effectiveness of the two dozen entrants by attempting to break them over the next 12 months or so before the competition closes.

The exercise seeks to identify new password hashing schemes that are suitable for widespread adoption as well as raising the profile of the issue and fighting against bad practices, such as storing passwords in plain text or not salting hashed passwords, as the competition website explains:

The Password Hashing Competition (PHC) is an effort organized to identify new password hashing schemes in order to improve on the state-of-the-art (PBKDF2, scrypt, etc.), and to encourage the use of strong password protection. Applications include for example authentication to web services, PIN authentication on mobile devices, key derivation for full disk encryption, or private keys encryption.

The PHC is being put together by a group of individuals, not an industry-recognised standardisation body. It might be that the competition throws up entrants who later become candidates for a standard but this is far from a given. Experts on the PHC panel include Matthew Green of Johns Hopkins University and Marsh Ray of Microsoft.

The competition is a marathon and not a sprint, explained Per Thorsheim, an independent security consultant and founder of the well regarded Passwords conferences.

"This competition is organised by Jean-Philippe Aumasson, known Swiss cryptographer and author of BLAKE, which was one of five finalists for the NIST SHA-2 competition," Thorsheim told El Reg.

"Submissions were due by 1 April, and now everybody is hard at work attacking all submissions in every way possible. The current timetable says that a winner will be selected in Q2 2015. Until then there will talks, conferences, mailing lists, meetings and whatnot."

One of the two dozens entries for the competition has already created a bit of a buzz on the interwebs. Researchers at New York University have developed a scheme called PolyPassHash for interlinking the representation of password hashes.

The idea is that instead of being able to use a rainbow table of the password hashes of common passwords or brute force tactics to recover passwords, attackers would be faced with the far trickier business of being obliged to crack groups of passwords together to get anywhere.

Hashing algorithms convert information into a shortened "message digest", via a one-way function that ought to make it impossible to recover the original information. Done successfully, the technology should thwart attempts to generate an identical digest from two different blocks of input data.

Hashing techniques are used in digital signatures, verifying that the contents of software downloads have not been tampered with, and many other cryptographic applications. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.