CRII: SaTC: Towards the Development of Stronger Memory-Hard Functions for Secure Password Hashing
CRII:SaTC:致力于开发更强的内存硬函数以实现安全密码散列
基本信息
- 批准号:1755708
- 负责人:
- 金额:$ 17.5万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2018
- 资助国家:美国
- 起止时间:2018-08-01 至 2020-07-31
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
Recent data breaches have exposed billions of user passwords to the dangerous threat of an offline password attacker who attempts to guess each user's password by brute force. Because an offline attacker can validate each password guess by itself using stolen password hashes from a data breach it is not possible to "lock out" an offline attacker after several incorrect guesses. The attacker is limited only by the computational resources necessary to mount a brute-force attack. To mitigate the risk of an offline attack the goal of a secure password hashing algorithm is to ensure that a brute force attack is prohibitively expensive even if the attacker has access to customized hardware such as an Application Specific Integrated Circuit (ASIC) that is optimized for password cracking. Memory hard functions (MHFs), functions whose computation require a large amount of memory, are a crucial cryptographic tool to achieve this goal since memory is expensive even on an ASIC. This project advances scientific understanding of memory hard functions and will directly impact future cryptographic standards for password hashing.The project is developing improved cryptanalysis techniques to evaluate the security of an MHF resulting in a deeper understanding of currently deployed MHFs. A main goal of this work is to design practical constructions of MHFs with provably optimal memory hardness in terms of bandwidth hardness, sustained space complexity, and amortized area-time complexity. Furthermore, the project focuses on establishing a scientific basis for tuning the parameters of an MHF to ensure that brute-force attacks are prohibitively expensive.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
最近的数据泄露事件使数十亿用户密码暴露在离线密码攻击者的危险威胁之下,这些攻击者试图通过暴力破解来猜测每个用户的密码。由于离线攻击者可以使用从数据泄露中窃取的密码散列来验证每个密码猜测,因此在多次错误猜测之后不可能“锁定”离线攻击者。攻击者仅受到发动暴力攻击所需的计算资源的限制。为了降低离线攻击的风险,安全密码散列算法的目标是确保暴力破解的成本过高,即使攻击者可以访问定制的硬件,例如针对密码破解进行优化的专用集成电路(ASIC)。存储器硬函数(MHF),其计算需要大量存储器的函数,是实现这一目标的关键密码工具,因为即使在ASIC上存储器也是昂贵的。该项目推进了对存储器硬函数的科学理解,并将直接影响未来密码散列的加密标准。该项目正在开发改进的密码分析技术,以评估MHF的安全性,从而加深对当前部署的MHF的理解。这项工作的一个主要目标是设计实用的MHF结构,可证明最佳的记忆硬度的带宽硬度,持续的空间复杂性,摊销面积时间复杂性。此外,该项目的重点是建立一个科学的基础,以调整MHF的参数,以确保蛮力攻击是令人望而却步的昂贵。这个奖项反映了NSF的法定使命,并已被认为是值得的支持,通过评估使用基金会的智力价值和更广泛的影响审查标准。
项目成果
期刊论文数量(14)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Towards a Rigorous Statistical Analysis of Empirical Password Datasets
- DOI:10.1109/sp46215.2023.10179431
- 发表时间:2021-05
- 期刊:
- 影响因子:0
- 作者:Jeremiah Blocki;Peiyuan Liu
- 通讯作者:Jeremiah Blocki;Peiyuan Liu
Locally Decodable/Correctable Codes for Insertions and Deletions
用于插入和删除的本地可解码/可纠正代码
- DOI:10.4230/lipics.fsttcs.2020.16
- 发表时间:2020
- 期刊:
- 影响因子:0
- 作者:Block, A;Blocki, J;Grigorescu, E;Kulkarni, S;Zhu, M.
- 通讯作者:Zhu, M.
Computationally Data-Independent Memory Hard Functions
计算数据独立的内存硬函数
- DOI:10.4230/lipics.itcs.2020.36
- 发表时间:2020
- 期刊:
- 影响因子:0
- 作者:Ameri, M;Blocki, J;Zhou, S.
- 通讯作者:Zhou, S.
Relaxed Locally Correctable Codes in Computationally Bounded Channels*
计算有限通道中的宽松局部可校正代码*
- DOI:10.1109/isit.2019.8849322
- 发表时间:2019
- 期刊:
- 影响因子:0
- 作者:Blocki, Jeremiah;Gandikota, Venkata;Grigorescu, Elena;Zhou, Samson
- 通讯作者:Zhou, Samson
DALock: Password Distribution-Aware Throttling
- DOI:10.56553/popets-2022-0084
- 发表时间:2022-07
- 期刊:
- 影响因子:0
- 作者:Jeremiah Blocki;Wuwei Zhang
- 通讯作者:Jeremiah Blocki;Wuwei Zhang
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Jeremiah Blocki其他文献
Application of Differential Privacy to the 2020 U.S. Census and American Community Survey: Researchers’ Understanding and Reactions
差异隐私在 2020 年美国人口普查和美国社区调查中的应用:研究人员的理解和反应
- DOI:
10.1177/1071181322661313 - 发表时间:
2022 - 期刊:
- 影响因子:0
- 作者:
Qi Zhong;R. Proctor;Jeremiah Blocki;Ninghui Li;Aiping Xiong - 通讯作者:
Aiping Xiong
Depth-Robust Graphs and Their Cumulative Memory Complexity
深度鲁棒图及其累积记忆复杂度
- DOI:
- 发表时间:
2017 - 期刊:
- 影响因子:0
- 作者:
J. Alwen;Jeremiah Blocki;Krzysztof Pietrzak - 通讯作者:
Krzysztof Pietrzak
Human Computable Passwords
人类可计算的密码
- DOI:
- 发表时间:
2014 - 期刊:
- 影响因子:0
- 作者:
Jeremiah Blocki;M. Blum;Anupam Datta - 通讯作者:
Anupam Datta
An Empirical Study of Mnemonic Password Recall Errors
助记词密码回忆错误的实证研究
- DOI:
- 发表时间:
2019 - 期刊:
- 影响因子:0
- 作者:
Aiping Xiong;Huangyi Ge;Robert W. Proctor;Jeremiah Blocki;Ninghui Li - 通讯作者:
Ninghui Li
Towards Practical Attacks on Argon2i and Balloon Hashing
对 Argon2i 和 Balloon Hashing 的实际攻击
- DOI:
- 发表时间:
2017 - 期刊:
- 影响因子:0
- 作者:
J. Alwen;Jeremiah Blocki - 通讯作者:
Jeremiah Blocki
Jeremiah Blocki的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Jeremiah Blocki', 18)}}的其他基金
CAREER: Cryptographic Tools for Usable Human Authentication
职业:用于可用人类身份验证的加密工具
- 批准号:
2047272 - 财政年份:2021
- 资助金额:
$ 17.5万 - 项目类别:
Continuing Grant
相似海外基金
CRII: SaTC: Towards a Secure and Efficient Ethereum P2P Network with Client Diversity
CRII:SaTC:迈向具有客户端多样性的安全高效的以太坊 P2P 网络
- 批准号:
2347486 - 财政年份:2024
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CRII: SaTC: Towards Understanding the Robustness of Graph Neural Networks against Graph Perturbations
CRII:SaTC:了解图神经网络对抗图扰动的鲁棒性
- 批准号:
2241713 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CRII: SaTC: Towards Understanding and Defending Against New Waves of Online Hate
CRII:SaTC:理解和防御新一波的网络仇恨
- 批准号:
2245983 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CRII: SaTC: Towards Data-effective and Cost-efficient Security Attack Detections
CRII:SaTC:迈向数据有效且经济高效的安全攻击检测
- 批准号:
2245968 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CRII: SaTC: Towards Detecting and Mitigating Vulnerabilities
CRII:SaTC:致力于检测和缓解漏洞
- 批准号:
2153474 - 财政年份:2022
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CRII: SaTC: RUI: Towards Trustworthy and Accountable IoT Data Marketplaces
CRII:SaTC:RUI:迈向值得信赖和负责任的物联网数据市场
- 批准号:
2153464 - 财政年份:2022
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CRII: SaTC: Towards Trustworthy and Accountable IoT Data Marketplaces
CRII:SaTC:迈向值得信赖和负责任的物联网数据市场
- 批准号:
2231085 - 财政年份:2022
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CRII: SaTC: Towards Secure and Privacy-preserving Input on Augmented Reality Systems
CRII:SaTC:增强现实系统的安全和隐私保护输入
- 批准号:
2153397 - 财政年份:2022
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CRII: SaTC: Towards Understanding Typing Privacy: Vulnerabilities and Protection
CRII:SaTC:了解打字隐私:漏洞和保护
- 批准号:
1948547 - 财政年份:2020
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CRII: SaTC: Towards Efficient and Scalable Crowdsourced Vulnerability-Discovery using Bug-Bounty Programs
CRII:SaTC:使用错误赏金计划实现高效且可扩展的众包漏洞发现
- 批准号:
1850510 - 财政年份:2019
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant