Evaluation of password hashing competition finalists: performance, security, compliance mapping, and post-quantum readiness

Yükleniyor...
Küçük Resim

Tarih

2025-11-15

Dergi Başlığı

Dergi ISSN

Cilt Başlığı

Yayıncı

Karyay Karadeniz Yayımcılık Ve Organizasyon Ticaret Limited Şirketi

Erişim Hakkı

info:eu-repo/semantics/openAccess

Araştırma projeleri

Organizasyon Birimleri

Dergi sayısı

Özet

Password hashes and key derivation functions (KDFs) are central to authentication and cryptographic security schemes crafted to defend user credentials from brute-force attacks and unauthorized access. Password hashing algorithms, for example PBKDF2, bcrypt, or scrypt, are very popular today, but are lacking in the face of modern hardware acceleration, parallel processing, and advanced cryptanalytic attacks. To contest these shortcomings, the Password Hashing Competition (PHC) was started in 2013 and had 22 candidates for functions for hashing passwords. After thorough evaluation, 9 finalists were selected based on how secure, fast, memory-friendly, flexible, and efficient these functions were. This study evaluates the nine PHC finalists—Argon2, battcrypt, Catena, Lyra2, MAKWA, Parallel, POMELO, Pufferfish, and yescrypt—through survey findings and performance benchmarks. We have evaluated these functions from an architectural standpoint and studied their security features, memory hardness, performance tradeoff, and practical usage. We also compare these finalists with traditional password hashing functions to highlight their advantages and limitations. We also investigate the post-quantum assumption for password hashing – the effectiveness of these functions against quantum assaults, their position in a new cryptography set, and the role of peppering as an additional security measure. In addition, we perform a comprehensive compliance mapping of the PHC finalists against major global standards and regulations such as NIST SP 800-63B, OWASP ASVS, PCI DSS, GDPR, KVKK, and ISO/IEC 27001, highlighting their practical suitability for secure deployment in regulated environments. Finally, we provide usage recommendations for these functions for web authentication, KDFs, and embedded platforms. This paper serves as a reference for researchers, developers, and security engineers, while also introducing a complianceaware, post-quantum-ready framework that bridges cryptographic design with regulatory and deployment needs.

Açıklama

Anahtar Kelimeler

Password hashing, Key derivation, Security, Performance, Quantum resistance, Compliance

Kaynak

Black Sea Journal of Engineering and Science

WoS Q Değeri

Scopus Q Değeri

Cilt

8

Sayı

6

Künye

Ulutaş, E. & Çeliktaş, B. (2025). Evaluation of password hashing competition finalists: performance, security, compliance mapping, and post-quantum readiness. Black Sea Journal of Engineering and Science, 8(6), 1841-1855. doi:https://doi.org/10.34248/bsengineering.1670109