[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAELGc4WSPC11ukBhRF8jDwK6nt2FGS+11cvf04eboes5ediUuw@mail.gmail.com>
Date: Fri, 10 Jul 2015 02:22:32 +0800
From: Hongjun Wu <wuhongjun@...il.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] Overview of PHC Candidates and Garbage-Collector Attacks
Hi Jocob,
Thanks for the report.
1. To be precise, the state of POMELO (of the second round) is updated
3*2^{t_cost}+2 times on average (some details: a state is updated through
feedback; local table lookup; global table lookup).
For example, for t_cost = 0, the state is updated 5 times on average;
for t_cost = 1, the state is updated 8 times on average; for t_cost = 2,
the state is updated 14 times on average.
2. Assume that the memory usage data in Table 1 is accurate, it is a
surprise that only two (?) finalists provide memory usage in a wide range
(Battcrypt: 128KB to 128M; POMELO: 8 KB to 256GB). Argon is another
candidate that provides memory in a wide range (1KB to 1GB), but Argon2
does not have that feature.
3. Since the report talks about the security of each candidate in Table 3,
I add something on POMELO below.
As analyzed in the POMELO document, even for t_cost = 0, POMELO
provides strong protection against the low memory attack since it is costly
to store partial state in the attack due to the combination of local table
lookup and global table lookup. The protection mechanism of POMELO against
low memory attack is completely different from all the other candidates,
and I think that POMELO provides a very efficient approach to defend
against low memory attack.
Best Regards,
Hongjun
On Thu, Jul 2, 2015 at 11:05 PM, Jakob Wenzel <jakob.wenzel@...-weimar.de>
wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Hi all,
>
> we have updated the classification document (including analysis
> regarding to (weak) garbage-collector attacks -- (W)GCA).
>
> See: https://eprint.iacr.org/2014/881
>
> Among other minor changes, the update includes:
> 1) Argon2d and Argon2i (as two instantiations of the finalist Argon2)
> 2) yescrypt now provides (W)GCA resistance under certain requirements
> depending on the input parameter
> 3) tables now differentiate between finalist/non-finalists
> 4) added motivation for (W)GCA attacks in the introduction
> 5) BLAKE2b-1 is added as hash function for Catena
> 6) BlaMka is added as permutation for Lyra2 (in brackets, since it is
> not fully analyzed yet and thus, not recommended as default
> instantiation by the authors of Lyra2)
>
> Comments are welcome.
>
> Best regards,
> Jakob
>
> - --
> Jakob Wenzel
> Research Assistant
> Chair of Media Security (Prof. Lucks)
> Bauhausstraße 11 (Room 217)
> 99423 Weimar
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
>
> iQEcBAEBCAAGBQJVlVNOAAoJEDFlRQsgEDnD0+cH/RLJMf44PMy3kJ+Zn5/Z+3du
> /npOODTTYkxWXjxaQXEkHyKuX/Xm0l77/fpHtndx7KtKIQ0s+gKY/0Bu63xxYXXb
> k/2Oit4t6LFvQIdUILIkbcnqPmZTZtvbu5VfPCx7e2bSWJjFOjc1NRd24RkhfUn7
> cgK24yxK5fkJwVu6lSJ3sbYA3xb1xYY0/67gEPmA8Jt50sKKqCs8zE+GSjz9Vwdf
> HYpU8veYEFaXKsryeqeJrcD67KgRAEZ0k+9BRUjB27dd80NlDi4OO5wSyn+7Fw0r
> Ix2YUcd4JzYnjdnO2B8RLalLgVQSGiYMqgie49dKnIpG37kiednagzyEG5SHOwE=
> =6pgK
> -----END PGP SIGNATURE-----
>
Content of type "text/html" skipped
Powered by blists - more mailing lists