lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 2 Sep 2014 14:53:56 -0300 (BRT)
From: Marcos Antonio Simplicio Junior <mjunior@...c.usp.br>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] A review per day - Schvrch

> On 09/02/2014 11:00 AM, Krisztián Pintér wrote:
> > On Tue, Sep 2, 2014 at 4:55 PM, Bill Cox
> > <waywardgeek@...hershed.org> wrote:
> >> You and I have different views about the importance of an
> >> efficient hash function, but plug in Lyra2's sponge into Gambit
> >> and my concerns over cache-bound efficiency mostly go away.
> >
> > reduced round it is, not some arcane sponge. why use that many
> > primitives? keccak *is* the silver bullet.
> >

> haha! Well, let's agree that we disagree on a number of issues.
> However, I do respect your code.

With the due respect to Keccak, which is a great design, its own authors recognize that it "excels in hardware performance", while it "has overall good software performance" (http://keccak.noekeon.org/). Since we normally consider hardware as an "attacker's platform" in the case of a PHS, Keccak does not seem to be the silver bullet in this case. 

Or, if it is, then a PHS is more like a Werewolf (pardon the pun :-) ) 

\Marcos. 

> Bill
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1

> iQIcBAEBAgAGBQJUBfQbAAoJEAcQZQdOpZUZHfIP/3+mhq1tFCodeMdWQPNB/wCH
> 8jFbkbf8dyDge3I+2eAxJz4Vf7WlLbBRzip61holUuOMiBdWLVHy1Kh/TnQZ7aNt
> YVoW73u2xoGD/Eg4N+NuSfHqM2En6nQGsqVFSbTArRzbvpdv+l3rneURvQrGSc44
> 3JbabJQqSk56L/EVkCwajn/6Xl0jKCVAqVx5wHyYD58rIPgP+69FTUxsRdg/4MRg
> l3VaVOA/e32we/40CUBj8TFvKLRQDXcBM6ZrHwyExq3TNAwirEdB8ET7wDLt+sl7
> BsWiQ1H7iUgwpNZ7hquuyhzrYrSBdU64lMtKKViWYRt7V3zrkRRBfeer0LsnwwkZ
> CgIOMAL9/NbdyA0r9aWMMsiq6g1p2MJ32F6iBG2NnDmkXBLNcLLeAkHjETGnnp6q
> K0C3p/MY+G76vjC3fv5tYCeflI9YTh5wD31Z0P7qfZFB7qhqTlAJ9SUg5aG2vtr9
> Hy7AOqsl1CrgdfGv06CkN1TUAxIlmae0weVyo8e7+tKHdK4kniWKbvVpg6z2WoiZ
> FiA6uvs9WXvp9uyh7X0aJgrNNRjC05mhCMpWFnaPCMSEnuVR8YPsaep605RsQDJu
> VmcE75jQxPPsf+xolDxPaK+j7U5SqavGf8U73amq/0UziF8FWPnRhtHtu5xqGyj3
> DqXFoB7Dob1866ygfdO+
> =KIU8
> -----END PGP SIGNATURE-----

Content of type "text/html" skipped

Powered by blists - more mailing lists