Feeds

The Great Hash Bakeoff: Infosec bods cook up next-gen crypto

Take a serverful of hash, add salt, hold the rainbow

5 things you didn’t know about cloud backup

Cryptographers are limbering up for a competition aimed at developing a next-generation password hash to create a better means for websites to store users' login credentials.

In total 24 submissions have been made to the Password Hashing Competition. Cryptographers will now test the effectiveness of the two dozen entrants by attempting to break them over the next 12 months or so before the competition closes.

The exercise seeks to identify new password hashing schemes that are suitable for widespread adoption as well as raising the profile of the issue and fighting against bad practices, such as storing passwords in plain text or not salting hashed passwords, as the competition website explains:

The Password Hashing Competition (PHC) is an effort organized to identify new password hashing schemes in order to improve on the state-of-the-art (PBKDF2, scrypt, etc.), and to encourage the use of strong password protection. Applications include for example authentication to web services, PIN authentication on mobile devices, key derivation for full disk encryption, or private keys encryption.

The PHC is being put together by a group of individuals, not an industry-recognised standardisation body. It might be that the competition throws up entrants who later become candidates for a standard but this is far from a given. Experts on the PHC panel include Matthew Green of Johns Hopkins University and Marsh Ray of Microsoft.

The competition is a marathon and not a sprint, explained Per Thorsheim, an independent security consultant and founder of the well regarded Passwords conferences.

"This competition is organised by Jean-Philippe Aumasson, known Swiss cryptographer and author of BLAKE, which was one of five finalists for the NIST SHA-2 competition," Thorsheim told El Reg.

"Submissions were due by 1 April, and now everybody is hard at work attacking all submissions in every way possible. The current timetable says that a winner will be selected in Q2 2015. Until then there will talks, conferences, mailing lists, meetings and whatnot."

One of the two dozens entries for the competition has already created a bit of a buzz on the interwebs. Researchers at New York University have developed a scheme called PolyPassHash for interlinking the representation of password hashes.

The idea is that instead of being able to use a rainbow table of the password hashes of common passwords or brute force tactics to recover passwords, attackers would be faced with the far trickier business of being obliged to crack groups of passwords together to get anywhere.

Hashing algorithms convert information into a shortened "message digest", via a one-way function that ought to make it impossible to recover the original information. Done successfully, the technology should thwart attempts to generate an identical digest from two different blocks of input data.

Hashing techniques are used in digital signatures, verifying that the contents of software downloads have not been tampered with, and many other cryptographic applications. ®

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.