lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 12 Sep 2014 10:36:21 -0400
From: Bill Cox <waywardgeek@...hershed.org>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] BSTY - yescrypt-based cryptocoin

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/11/2014 03:24 AM, Solar Designer wrote:
> Also interesting is what happens with 1 MiB per hash:
> 
> 6 rounds, 4 threads: 6300 6 rounds, 8 threads: 7300 2 rounds, 4 
> threads: 13400 2 rounds, 8 threads: 14550 to 15400 (unstable 
> speed)
> 
> As expected, this makes 8 threads the optimal choice again.  The 
> speed and bandwidth usage difference between 6 and 2 rounds 
> improves to 2x+. Of course, like before this is countered by the
> 3x reduction in compute hardening per hash computed (so up to 1.5x 
> overall).
> 
> When AVX2 code is written, it will improve speeds at 6 rounds 
> slightly (but less so at 2 rounds).
> 
> Alexander
> 

I think I prefer the 2 round vs 6 round for this PoW application.
Designing fast multipliers is hard, but so is designing 2MiB fast
SRAMs.  Doubling the SRAM bandwidth and cutting the computation speed
by 3X seems like a reasonable trade-off to me, especially since you
also gain speed in block chain verification.

I might be tempted to increase to 4MiB though :-)

Here's one problem I have with GlobalBoost-Y.  It sounds like a dream
come true for botnet operators.  Can you think of anything to defend
against botnet GlobalBoost-Y mining?

Bill
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJUEwThAAoJEAcQZQdOpZUZIfYP/iW5hddzwSqja0V3ZWNvdnes
RkiYxOStzWKn0by3tWNYij2hixgsaDrY8OZcWHxdcRboaNE8p0PopOac5EXqGSFu
0wajrPLFv7EsGukwsknV8a6jJDG5D6qgNWPKu59f0x6yiiBSRq2R5N/2pvRL8w81
M6y5yR9I3Ym2J4ngrdEZSU3YErYPNyVca23lSVLxbzrqbszN3uY+cvzBxQVtWabk
b+78Lnvsk5HSUJApc1BkjKfbRzgU0c5LZaQaEauge9MYFjpSvHfmd9b/R80zaPAH
uS3O6XRqLCRJJskxEMQ5s33SM8h6GtjR0LfQZp6AiqlLKYqGauDmJ3xDIIRKWvPX
aVmYH6/5mqLmza76q3aGUa/quRBJE5a5SN6DXZC+UfsVxqC+KnC6u6cGCLMR31jL
rbQzCEcetTwqjHjgiFb1KOAJtm07PTl83q22tO8D88mZ6NDQ6Uupf1fzvB8RnvXc
uIPSx14oNVfIFHsaKFYEKrt6+LaBTp43LlM4OZ6t1lkrLIpm8jGl+dN5uzTHkytU
4adaMzr3CINLDgUFJReh31qR66EwsM6tYVftSawtIPVFdcTvpSKkBGElVf3w6krF
a9LsALNpK91W5srtaO9azPA418d9yVMRAqBOP8vxZOiWtz/QrT3+UsQBFPkHf/Zz
SEijjRWh55Fjo5RPz5cv
=Vgkk
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ