[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2837.1389257606@critter.freebsd.dk>
Date: Thu, 09 Jan 2014 08:53:26 +0000
From: "Poul-Henning Kamp" <phk@....freebsd.dk>
To: Bill Cox <waywardgeek@...il.com>
cc: discussions@...sword-hashing.net
Subject: Re: [PHC] Lyra, Password Key Derivation Based On The Sponge Construction
In message <CAOLP8p524kik7DkZpf_21AKycjNL6DJ95vzF78GxFW4tesgEPQ@...l.gmail.com>
, Bill Cox writes:
>I think there's a lot of fear about putting forward entries that don't use
>proven cryptographic hashes in the inner loop. Alexander has proven such a
>system can be pretty fast, but there's 2X-ish or more in speed left on the
>table. I'd love to see what he an the others would come up with if they
>felt comfortable deviating from known hashes.
I'm very open minded in this respect, but only if the proposed scheme
comes with credible documentation for distribution and entropy-retention.
--
Poul-Henning Kamp | UNIX since Zilog Zeus 3.20
phk@...eBSD.ORG | TCP/IP since RFC 956
FreeBSD committer | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.
Powered by blists - more mailing lists