lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 1 Apr 2015 18:36:32 +0300
From: Solar Designer <solar@...nwall.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] Compute time hardness

On Wed, Apr 01, 2015 at 08:20:29AM -0700, Bill Cox wrote:
> Alexander's technique of counting sequential operations, and giving
> multiply more weight seems reasonable to me, though he's once again
> under-cutting himself by only claiming a multiply is worth 3 additions.
> Use 8 and you'll be closer to reality, IMO.

I agree.  All we know is it's somewhere between 3 and 32.

> The algorithms also need careful analysis to be  sure an attacker can't
> start computing the next operation before the previous one is done, or at
> least take into account the potential speedup.  A chain of additions, for
> example, let's you propagate the low bits very fast compared to the high
> bits.  I feel good about both the reduced Blake2b round and Yescrypt's
> PWXFORM round here.

I thought of this yesterday, and my gut feeling is that there might be
some minimal speedup for some of the sequences in Blake2b here.

Alexander

Powered by blists - more mailing lists