[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAOLP8p426wFrvs6k-vMuOnB7BfD3041e1A0_Ystne+Eq1TR8uA@mail.gmail.com>
Date: Tue, 11 Mar 2014 16:43:38 -0400
From: Bill Cox <waywardgeek@...il.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] TigerPHS paper and code ready for review
Based on a lot of excellent feedback, I've updated TigerKDF, which I'm
now calling TigerPHS, for Password Hashing Scheme rather than Key
Derivation Function. The latest version of my paper is at:
http://waywardgeek.net/TigerPHS.pdf
Code can be viewed/cloned at:
https://github.com/waywardgeek/tigerphs
I've updated the benchmarks based on Alexander's feedback.
After the excellent discussion on PBKDF2 and HKDF, I've switched from
PBKDF2-BLAKE2S to HKDF-SHA256 for initial and final key derivation,
with Blake2s still used in the memory hashing part. Every input other
than stopMemCost is now hashed in the initial hkdfExtract, conforming
to the author's description of how to do a "strongly secure" key
derivation.
I've reduce the number of "slices" from 16 to 4, as per Solar
Designer's recommendation.
The paper has been improved as well.
Let me know what you think.
Thanks,
Bill
Powered by blists - more mailing lists