On Time-Memory Trade-Offs for Password Hashing Schemes
Loading...

Date
2024
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Frontiers Media Sa
Open Access Color
GOLD
Green Open Access
No
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
A password hashing algorithm is a cryptographic method that transforms passwords into a secure and irreversible format. It is used not only for authentication purposes but also for key derivation mechanisms. The primary purpose of password hashing is to enhance the security of user credentials by preventing the exposure of plaintext passwords in the event of a data breach. As a key derivation function, password hashing aims to derive secret keys from a master key, password, or passphrase using a pseudorandom function. This review focuses on the design and analysis of time-memory trade-off (TMTO) attacks on recent password hashing algorithms. This review presents a comprehensive survey of TMTO attacks and recent studies on password hashing for authentication by examining the literature. The study provides valuable insights and strategies for safely navigating transitions, emphasizing the importance of a systematic approach and thorough testing to mitigate risk. The purpose of this paper is to provide guidance to developers and administrators on how to update cryptographic practices in response to evolving security standards and threats.
Description
Keywords
Time-Memory Trade-Offs (Tmtos), Password Hashing Schemes (Phs), Pbkdf2, Dictionary Attacks, Rainbow Tables, PBKDF2, password hashing schemes (PHS), Electronic computers. Computer science, dictionary attacks, rainbow tables, QA75.5-76.95, time-memory trade-offs (TMTOs)
Fields of Science
0211 other engineering and technologies, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences
Citation
Saran, Ayse Nurdan (2024). "On time-memory trade-offs for password hashing schemes", Frontiers in Computer Science, Vol. 6.
WoS Q
Q3
Scopus Q
Q2

OpenCitations Citation Count
2
Source
Frontiers in Computer Science
Volume
6
Issue
Start Page
End Page
PlumX Metrics
Citations
Scopus : 4
Captures
Mendeley Readers : 29
SCOPUS™ Citations
4
checked on Feb 13, 2026
Web of Science™ Citations
2
checked on Feb 13, 2026
Page Views
4
checked on Feb 13, 2026
Google Scholar™


