back to article The Great Hash Bakeoff: Infosec bods cook up next-gen crypto

Cryptographers are limbering up for a competition aimed at developing a next-generation password hash to create a better means for websites to store users' login credentials. In total 24 submissions have been made to the Password Hashing Competition. Cryptographers will now test the effectiveness of the two dozen entrants by …

COMMENTS

This topic is closed for new posts.
  1. John Smith 19 Gold badge
    WTF?

    Storing unencryped passwords or unsalted passwords

    Who does that in 2014?

    And for bonus points, why?

    1. Graham Marsden
      Facepalm

      @John Smith 19 - Re: Storing unencryped passwords or unsalted passwords

      a) Too many people

      and

      b) Because they're too lazy or stupid to do anything about it.

      And you forgot:

      c) WHY are there *still* sites out there which, when you sign up, send your password to you in PLAIN TEXT???

    2. big_D Silver badge

      Re: Storing unencryped passwords or unsalted passwords

      Passwords in 2014? Why aren't we using something more secure?

      I'm looking forward to seeing SQRL in action...

      1. Michael Wojcik Silver badge

        Re: Storing unencryped passwords or unsalted passwords

        Passwords in 2014? Why aren't we using something more secure?

        Indeed. Passwords should have gone away in the 1980s. Even moving to passphrases would be a huge improvement.

        There are still sensitive-data consumer sites - Charles Schwab's investor/banking site, for example - that not only don't support passphrases, but have ridiculous limits on the passwords they do support. (Schwab's are limited to 8 characters and don't allow most punctuation, let alone non-ASCII. Someone there really needs to be fired. Even if the back end has those limitations, the front end could allow much better passwords and hash them down into something that meets the backend requirements, which would provide much better usability and make it harder to guess passwords.)

  2. Pete 2 Silver badge

    Having a cracking time

    > attempting to break them over the next 12 months ... attacking all submissions in every way possible

    One would hope (but not expect) that these attempts would extend into the world of social engineering and coercion - just as they would in the real world.

    Password security has technical integrity as only one part of the whole regime.

    The ideal password security system would contain features that would be unknowable to, or unusable by, people to whom the security credentials did not belong

    1. Anonymous Coward
      Anonymous Coward

      Re: Having a cracking time

      The ideal security system would contain features that would be unknowable to, or unusable by, people to whom the security credentials did not belong.

      Which all falls apart because, by necessity, someone has to do the authentication. Not even the most ideal security system in the world can defeat an insider. And since insiders can be near-perfect moles in a world where it is difficult just to find out you have a mole in your midst...

      1. Michael Wojcik Silver badge

        Re: Having a cracking time

        The ideal security system would contain features that would be unknowable to, or unusable by, people to whom the security credentials did not belong.

        Which all falls apart because, by necessity, someone has to do the authentication.

        Authentication protocols based on zero-knowledge proofs, such as SRP and PAK-RY, satisfy precisely this criterion: no one but the owner of the credentials knows the secret. Authenticating parties only possess an authenticator, which can be used to authenticate, but not impersonate.

        Not even the most ideal security system in the world can defeat an insider.

        Since the term "insider" has no technical definition, that's an empty claim. You can always apply Descartes' evil-genius thought experiment to show no security system is perfectly secure, because users can never guarantee that their senses or processes of thought have not been compromised.

        In any case, "ideal security system" is not a well-defined term. A system is only secure (or not) in the context of a threat model, and then usually only probabilistically and/or in relation to work factors.

    2. Steve Knox
      Paris Hilton

      Re: Having a cracking time

      The ideal password security system would contain features that would be unknowable to, or unusable by, people to whom the security credentials did not belong.

      Given the repeated findings that people give up their own passwords under the flimsiest of pretexts, the ideal system would contain features unknown to the very people to whom the credentials do in fact belong.

      1. Charles 9

        Re: Having a cracking time

        Given the repeated findings that people give up their own passwords under the flimsiest of pretexts, the ideal system would contain features unknown to the very people to whom the credentials do in fact belong.

        Which kind of puts you in a dead end since a credential has to be presented in order to be used as a credential. How can someone present a credential they don't even know about?

        Plus, as I've previously mentioned, who authenticates the authenticator?

  3. i like crisps
    FAIL

    You missed a bit...

    "Take a severful of Hash,add salt, hold the rainbow AND LEAVE THE BACKDOOR OPEN SO GCHQ CAN POP ROUND FOR A CUP OF COFFEE.

    1. Anonymous Coward
      Anonymous Coward

      Re: You missed a bit...

      "Take a severful of Hash,add salt, hold the rainbow AND GIVE THE KEYS TO THE NSA BECAUSE THEY ASKED FOR THEM."

  4. Anonymous Coward
    Unhappy

    'Disappointed Face'

    I thought from the title we were re-visiting the all-important subject of multinational take-away nosh...

  5. Grikath

    Damn....

    And there was me hoping this was about cake..

This topic is closed for new posts.

Other stories you might like