hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Clipaha: A Scheme to Perform Password Stretching on the Client
Chalmers University of Technology, Gothenburg, Sweden.
Chalmers University of Technology, Gothenburg, Sweden.ORCID iD: 0000-0002-3383-9617
Halmstad University, School of Information Technology.ORCID iD: 0000-0002-0303-3858
Uppsala University, Uppsala, Sweden.
2023 (English)In: Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP / [ed] Paolo Mori; Gabriele Lenzini; Steven Furnell, Science and Technology Publications, Lda , 2023, p. 58-69Conference paper, Published paper (Refereed)
Abstract [en]

Password security relies heavily on the choice of password by the user but also on the one-way hash functions used to protect stored passwords. To compensate for the increased computing power of attackers, modern password hash functions like Argon2, have been made more complex in terms of computational power and memory requirements. Nowadays, the computation of such hash functions is performed usually by the server (or authenticator) instead of the client. Therefore, constrained Internet of Things devices cannot use such functions when authenticating users. Additionally, the load of computing such functions may expose servers to denial of service attacks. In this work, we discuss client-side hashing as an alternative. We propose Clipaha, a client-side hashing scheme that allows using high-security password hashing even on highly constrained server devices. Clipaha is robust to a broader range of attacks compared to previous work and covers important and complex usage scenarios. Our evaluation discusses critical aspects involved in client-side hashing. We also provide an implementation of Clipaha in the form of a web library1 and benchmark the library on different systems to understand its mixed JavaScript and WebAssembly approach’s limitations. Benchmarks show that our library is 50% faster than similar libraries and can run on some devices where previous work fails. © 2023 by SCITEPRESS – Science and Technology Publications, Lda. Under CC license (CC BY-NC-ND 4.0).

Place, publisher, year, edition, pages
Science and Technology Publications, Lda , 2023. p. 58-69
Series
ICISSP, ISSN 2184-4356
Keywords [en]
Argon2, IoT Security, Password Stretching, Password-based Authentication, Server Relief, Web Security
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:hh:diva-52116DOI: 10.5220/0011653200003405Scopus ID: 2-s2.0-85176332335ISBN: 9789897586248 (print)OAI: oai:DiVA.org:hh-52116DiVA, id: diva2:1814532
Conference
9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, 22-24 February, 2023
Available from: 2023-11-24 Created: 2023-11-24 Last updated: 2023-11-24Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Picazo-Sanchez, Pablo

Search in DiVA

By author/editor
Almgren, MagnusPicazo-Sanchez, Pablo
By organisation
School of Information Technology
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 18 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf