An oblivious password cracking server
- Autores
- Calvo, Aureliano; Futoransky, Ariel; Sarraute, Carlos
- Año de publicación
- 2012
- Idioma
- inglés
- Tipo de recurso
- documento de conferencia
- Estado
- versión publicada
- Descripción
- Building a password cracking server that preserves the privacy of the queries made to the server is a problem that has not yet been solved. Such a server could acquire practical relevance in the future: for instance, the tables used to crack the passwords could be calculated, stored and hosted in cloud-computing services, and could be queried from devices with limited computing power. In this paper we present a method to preserve the confidentiality of a password cracker—wherein the tables used to crack the passwords are stored by a third party—by combining Hellman tables and Private Information Retrieval (PIR) protocols. We provide the technical details of this method, analyze its complexity, and show the experimental results obtained with our implementation.
Sociedad Argentina de Informática e Investigación Operativa - Materia
-
Ciencias Informáticas
PIR Protocols
Cracking Server - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc-sa/4.0/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/125162
Ver los metadatos del registro completo
id |
SEDICI_d054a39133eedbb06e91f8874c6ad6ec |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/125162 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
An oblivious password cracking serverCalvo, AurelianoFutoransky, ArielSarraute, CarlosCiencias InformáticasPIR ProtocolsCracking ServerBuilding a password cracking server that preserves the privacy of the queries made to the server is a problem that has not yet been solved. Such a server could acquire practical relevance in the future: for instance, the tables used to crack the passwords could be calculated, stored and hosted in cloud-computing services, and could be queried from devices with limited computing power. In this paper we present a method to preserve the confidentiality of a password cracker—wherein the tables used to crack the passwords are stored by a third party—by combining Hellman tables and Private Information Retrieval (PIR) protocols. We provide the technical details of this method, analyze its complexity, and show the experimental results obtained with our implementation.Sociedad Argentina de Informática e Investigación Operativa2012info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf9-20http://sedici.unlp.edu.ar/handle/10915/125162enginfo:eu-repo/semantics/altIdentifier/issn/2313-9110info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:30:08Zoai:sedici.unlp.edu.ar:10915/125162Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:30:08.475SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
An oblivious password cracking server |
title |
An oblivious password cracking server |
spellingShingle |
An oblivious password cracking server Calvo, Aureliano Ciencias Informáticas PIR Protocols Cracking Server |
title_short |
An oblivious password cracking server |
title_full |
An oblivious password cracking server |
title_fullStr |
An oblivious password cracking server |
title_full_unstemmed |
An oblivious password cracking server |
title_sort |
An oblivious password cracking server |
dc.creator.none.fl_str_mv |
Calvo, Aureliano Futoransky, Ariel Sarraute, Carlos |
author |
Calvo, Aureliano |
author_facet |
Calvo, Aureliano Futoransky, Ariel Sarraute, Carlos |
author_role |
author |
author2 |
Futoransky, Ariel Sarraute, Carlos |
author2_role |
author author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas PIR Protocols Cracking Server |
topic |
Ciencias Informáticas PIR Protocols Cracking Server |
dc.description.none.fl_txt_mv |
Building a password cracking server that preserves the privacy of the queries made to the server is a problem that has not yet been solved. Such a server could acquire practical relevance in the future: for instance, the tables used to crack the passwords could be calculated, stored and hosted in cloud-computing services, and could be queried from devices with limited computing power. In this paper we present a method to preserve the confidentiality of a password cracker—wherein the tables used to crack the passwords are stored by a third party—by combining Hellman tables and Private Information Retrieval (PIR) protocols. We provide the technical details of this method, analyze its complexity, and show the experimental results obtained with our implementation. Sociedad Argentina de Informática e Investigación Operativa |
description |
Building a password cracking server that preserves the privacy of the queries made to the server is a problem that has not yet been solved. Such a server could acquire practical relevance in the future: for instance, the tables used to crack the passwords could be calculated, stored and hosted in cloud-computing services, and could be queried from devices with limited computing power. In this paper we present a method to preserve the confidentiality of a password cracker—wherein the tables used to crack the passwords are stored by a third party—by combining Hellman tables and Private Information Retrieval (PIR) protocols. We provide the technical details of this method, analyze its complexity, and show the experimental results obtained with our implementation. |
publishDate |
2012 |
dc.date.none.fl_str_mv |
2012 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/conferenceObject info:eu-repo/semantics/publishedVersion Objeto de conferencia http://purl.org/coar/resource_type/c_5794 info:ar-repo/semantics/documentoDeConferencia |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/125162 |
url |
http://sedici.unlp.edu.ar/handle/10915/125162 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/issn/2313-9110 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
dc.format.none.fl_str_mv |
application/pdf 9-20 |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1844616180833189888 |
score |
13.070432 |