Passwordless Authentication for the Quantum Era
The above table from Hive Systems provides a comprehensive overview of the time required to crack passwords of varying lengths and complexities using current classical computing power. The data is based on using 12 RTX 4090 GPUs and bcrypt hashing, illustrating the capabilities of modern hardware in brute-forcing passwords.
Hash functions are fundamental to many cryptographic systems because they are designed to be one-way functions. Let's explore this concept using SHA-256, a widely used cryptographic hash function, and understand the impact of quantum computing on password security.
SHA-256 (Secure Hash Algorithm 256-bit) is part of the SHA-2 family of hash functions. It takes an input and produces a 256-bit (32-byte) hash value, often rendered as a 64-character hexadecimal number.
For example, the SHA-256 hash of the word "password" is: 5e884898da28047151d0e56f8dc6292773603d0d6aabbddcba5d70ef66e15578
Why Reversing SHA-256 is Impossible
SHA-256 is designed to be a one-way function. This means that while it is easy to compute the hash from an input, it is computationally infeasible to reverse the hash back to the original input. This property is known as pre-image resistance.
For example, given the hash 5e884898da28047151d0e56f8dc6292773603d0d6aabbddcba5d70ef66e15578, it is impractical to determine that the original input was "password."
How Hackers Crack SHA-256 Hashes?
However, instead of reversing the hash, hackers use a method called "cracking" to discover the original input:
Example of Cracking SHA-256
Suppose a hacker wants to crack the hash 5e884898da28047151d0e56f8dc6292773603d0d6aabbddcba5d70ef66e15578. The process would look like this:
Step 1: Generate a list of possible passwords (e.g., "password1", "password123", "admin", etc.).
Step 2: Hash each password using SHA-256:
Step 3: Compare each hash with the target hash:
领英推荐
Quantum Computing and Time Complexity
The advent of quantum computing significantly alters the security landscape. Quantum computers leverage quantum mechanics to solve certain problems much faster than classical computers.
To understand the impact of quantum computing, we adjust the cracking times by considering the quadratic speedup provided by Grover's algorithm:
Quantum computing introduces new challenges for cryptographic security. Grover's algorithm, a quantum search algorithm, can speed up the brute-force search process.
Classical Computing: If a classical computer requires 2^40 operations to brute force an 8-character password, this means that there are 2^40 possible combinations.
Quantum Computing (Grover's Algorithm): With Grover's algorithm, the number of operations needed is reduced to 2^20 because √(2^40) = 2^20.
This quadratic speedup effectively halves the number of bits of security. In other words: A password that provides 2^n security on a classical computer only provides 2^(n/2) security on a quantum computer using Grover's algorithm.
An 8-character password with 40 bits of security (2^40 operations on a classical computer) would require approximately 2^20 operations on a quantum computer.
This quadratic speedup means that the effective security level of SHA-256 is halved when considering quantum attacks. While 2^256 operations are still infeasible with current quantum technology, this reduction highlights the need for alternative practices.
Practical Implications and Recommendations
In a post-quantum world, maintaining security requires significant advancements in our cryptographic methods. One such recommendation is to double the output size of hash functions; for example, transitioning from SHA-256 to SHA-512. However, it's crucial to recognize that password cracking techniques often leverage more than just computational power—they exploit methods like dictionary attacks as well.
To truly enhance security and user convenience, passwordless authentication methods are the way forward. By eliminating the need for passwords altogether, we remove the fundamental vulnerability that passwords represent. After all, a password can't be cracked if it doesn't exist.
Conclusion
Although reversing SHA-256 hashes remains infeasible, the rapid advancements in quantum computing demand a thorough reevaluation of our current security practices. By understanding the significant impact of quantum algorithms like Grover's, we can proactively prepare for a more secure future. Adopting passwordless authentication to strengthen our digital identities will be essential to staying ahead of these evolving threats.
In part two of this series, we'll explore key-based authentication. The security difference between password and key-based authentication is substantial. Key-based authentication, particularly with longer keys like 2048-bit, provides exponentially greater security than password-based methods. This underscores the crucial need to transition to passwordless authentication mechanisms, especially as quantum computing capabilities continue to advance.
Share your thoughts in the comments below or reach out to me at [email protected]
Pegasus Angel Accelerator
1 个月??
Lead IT Security Engineer
6 个月We noticed 14 characters all lower case in 2024 is 776k years but in 2023 the same is 1 year and 2022 is 4 years. Why does 2024 have such a leap harder backwards plus buck the trending trajectory in your model?
Selva Kumaraswamy excellent job simplifying maths, and technology behind brute force cracking of passwords and comparing passwords bruteforce cracking pre and post quantum computing era #PQC #Passwordless #Authentication #QuantumComputing Hawcx
Innovate. Inspire. Impact. | Unlocking Potential, Driving Growth | Results-Driven People-First Leader | Ex-Meta | Ex-Visa
9 个月Thanks for sharing. The future of authentication is passwordless, and it's exciting to see the technology advancing. Great insights in this article!