DocumentCode :
2168460
Title :
Security Analysis of salt||password Hashes
Author :
Gauravaram, P.
Author_Institution :
Tata Consultancy Services Innovation Labs., Tata Consultancy Services Ltd., Hyderabad, India
fYear :
2012
fDate :
26-28 Nov. 2012
Firstpage :
25
Lastpage :
30
Abstract :
Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as birthday and dictionary attacks on the hash values of passwords to find passwords, it is usually recommended to apply hash function to the combination of both the salt and password, denoted salt||password, to prevent these attacks. In this paper, we present the first security analysis of salt||password hashing application. We show that when hash functions based on the compression functions with easily found fixed points are used to compute the salt||password hashes, these hashes are susceptible to precomputed offline birthday attacks. For example, this attack is applicable to the salt||password hashes computed using the standard hash functions such as MD5, SHA-1, SHA-256 and SHA-512 that are based on the popular Davies-Meyer compression function. This attack exposes a subtle property of this application that although the provision of salt prevents an attacker from finding passwords, salts prefixed to the passwords do not prevent an attacker from doing a precomputed birthday attack to forge an unknown password. In this forgery attack, we demonstrate the possibility of building multiple passwords for an unknown password for the same hash value and salt. Interestingly, password||salt (i.e. salts suffixed to the passwords) hashes computed using Davies-Meyer hash functions are not susceptible to this attack, showing the first security gap between the prefix-salt and suffix-salt methods of hashing passwords.
Keywords :
authorisation; cryptography; data compression; Davies-Meyer compression function; MD5 hash function; SHA-1 hash function; SHA-256 hash function; SHA-512 hash function; computer network authentication; computer system authentication; cryptographic hash functions; dictionary attacks; forgery attack; memory look-up attacks; offline birthday attacks; password hash value protection; prefix-salt methods; salt∥password hash security analysis; security gap; suffix-salt methods; Compression functions; Computer systems security; Cryptography; Hash functions; Password; Salt;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4673-5832-3
Type :
conf
DOI :
10.1109/ACSAT.2012.49
Filename :
6516321
Link To Document :
بازگشت