[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <874n2apnkq.fsf@wolfjaw.dfranke.us>
Date: Thu, 03 Apr 2014 09:08:53 -0400
From: Daniel Franke <dfoxfranke@...il.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] Deliberately GPU-friendly password hashes?
Steve Thomas <steve@...tu.com> writes:
> Parallel it's SIMD, GPU, FPGA, and ASIC friendly. It's not memory-hard,
> but as a defender you can use whatever hardware the attacker is using.
> Well besides maybe ASICs but it depends on how interface to them is. If
> it's a simple send password and salt or initial key and get a hash back
> then yes, but if it's a here's the salt and hash now let me send you a
> bunch of passwords to test and ask if one of the last N passwords match
> then it won't work.
I don't like the threat model implied by the argument you're
making. You're assuming that the defender gets to adapt his algorithm
and parameter choices to the attacker's hardware choices. The reality is
the other way around.
Powered by blists - more mailing lists