Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PBKDF integration? #1

Open
baryluk opened this issue Oct 18, 2018 · 2 comments
Open

PBKDF integration? #1

baryluk opened this issue Oct 18, 2018 · 2 comments

Comments

@baryluk
Copy link

baryluk commented Oct 18, 2018

Hi,

I understand that for most parts SRP do not need costly KDF for password, but I think some way to impose some additional CPU or RAM cost on the client (but not server), would be beneficial to implement a active brute force prevention mechanism without requiring extensive state on the server side.

PBKDF2, scrypt, Catena, Lyra2, Argon2id sounds like reasonable choices, but AFAIK they can't be readily applied to SRP, because, even if key is randomized (and provided by server), the server have no way to verify computations, as the resulting key would have no correspondence to the data stored on server (verifiers). Storing passwords on server too defeats the purpose, and would make other problems (i.e. opening to brute force attacks from data observed passively by adversary).

Also they would make incur same CPU and RAM cost on both sides, which is undesirable. My favorite of asymetric proof of work is Cuckoo Cycle finding, which is memory (storage and random access) intensive and CPU intensive (but not deterministic, only expected runtime) on the client side, but very cheap (almost no RAM and CPU used, few orders of magnitude less than on client side, and constant time/deterministic/bounded) on the verifier side.

I am not sure, maybe just addition of a phase 0, beyond SRP protocol is a solution here, like just proving computations where made before starting SRP, to prevent DoS. But that adds roundtrips, or alternatively opens solution probe to replay attack.

@baryluk
Copy link
Author

baryluk commented Oct 20, 2018

I just learned about OPAQUE that is addressing this issue:

https://blog.cryptographyengineering.com/2018/10/19/lets-talk-about-pake/

https://eprint.iacr.org/2018/163.pdf

It also solves a problem of offline precomputation attack, by not revealing salt to attacker.

@baryluk
Copy link
Author

baryluk commented Oct 20, 2018

Specific protocol draft - https://tools.ietf.org/html/draft-krawczyk-cfrg-opaque-00 , it was published just 2 weeks ago ;)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant