Sample Header Ad - 728x90

LUKS: Use TPM to make password hash function resistant to parallellized cracking

1 vote
0 answers
113 views
In order to do that, I think it's possible to make the password hash dependent on the TPM: that way, an attacker would need to invoke the TPM for every password hash, limiting the speed of password cracking to the speed of the TPM (alternatively, an attacker could attack the TPM itself and try to dump those keys, but let's assume this is not feasible; if it is possible, the password itself is still a protection). This setup seems theoretically possible, but I'm wondering if it is already implemented in **LUKS/GRUB/...** today or if I would need to program it myself. If it is already implemented, please explain how to set up such a system, preferably on **Arch Linux**.
Asked by redfast00 (417 rep)
May 2, 2023, 02:27 PM
Last activity: Mar 19, 2025, 03:15 PM