lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150523010038.GA18694@openwall.com>
Date: Sat, 23 May 2015 04:00:38 +0300
From: Solar Designer <solar@...nwall.com>
To: discussions@...sword-hashing.net
Subject: optimized Parallel

Hi,

I don't know why Steve isn't posting this in here himself, but he
tweeted a few days ago that he produced an optimized implementation of
Parallel with SHA-256 as the underlying hash function.  (This is
slightly different from the PHC submission, which uses SHA-512, but
since Parallel is in the same category with PBKDF2, it's OK - not a
tweak.  The submission does mention that the hash function can be
changed.)

Steve - why did you choose to switch to SHA-256 for this, though?

<Sc00bzT> Finally got around to finishing an optimized version of Parallel. I'm getting 6.2 MH/s SHA256 on a Q9300:
https://github.com/Sc00bz/Parallel

<@Sc00bzT> Oh right I still need to get around to writing the make file. Also it takes 12 CPU core-minutes to compile in VS2013

The code does indeed look optimized: includes interleaving and SIMD, all
the way up to AVX-512 with ternary logic intrinsics.

Alexander

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ