lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <53FF5B21.1090801@ciphershed.org>
Date: Thu, 28 Aug 2014 12:38:57 -0400
From: Bill Cox <waywardgeek@...hershed.org>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] Memory performance and ASIC attacks

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/28/2014 12:28 PM, Marcos Simplicio wrote:
> Hi,
> 
> On the matter of parallelizability: our code does not allow 
> multithreading basically because we did not have time to implement
> and test the "p" parameter discussed in the "extensions" part of
> the documentation. :(
> 
> This is about to change, though, since we have been focusing on
> the "extensions" discussed in the algorithm's proposal (mainly on
> how to control the memory bandwidth up/down while adding
> parallelism). AFAIU, the approach adopted in different from those
> of Yescript and Twocats, as the parallelism is on the memory matrix
> level rather than on the level of cells. There may be some
> (dis)advantages when compared to those two, but we will only be
> able to tell after we finish our tests :)
> 
> BR,
> 
> Marcos.

Sweet!  Actually, both TwoCats and Yescrypt multi-threading have some
defense against running threads sequentially rather than in parallel,
in that there is some hashing between the memory used by different
threads.  Both make use of SIMD level parallelism and thread level.
Lyra2 is very efficient for a PHC entry, and your team is doing great
work so far.  I'm confident you will get this part right :-)

Bill
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=8sha
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ