lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 20 Jul 2015 21:15:55 +0200
From: Forler <cforler@...teo.de>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] PHC winner and special recognitions

Hi Folks,

first of all congratulation to the Argon Team. Alex and Dimitry did a
great job.

I think PHC was very successful since it  has pushed the boundaries of
password hashing and created some of the innovations that hopefully make
the vast majority of adversaries quite unhappy. :-)
 
Last but not least, special thanks to all PHC contributors and the panel
of experts, especial to Jean-Philippe.

Best regards,
Christian

Am 20.07.2015 um 19:43 schrieb Jean-Philippe Aumasson:
>
> On behalf of the Password Hashing Competition (PHC) panel:
>
>
> We have selected *Argon2* as a basis for the final PHC winner. We will
> work with the designers to determine the final version, and in
> particular what tweaks will be made. This discussion will be carried
> out on the public PHC mailing list (discussions@...sword-hashing.net
> <mailto:discussions@...sword-hashing.net>), and everyone can contribute.
>
>
> We will eventually release a final specification and reference C code
> of the final Argon2-based winner.
>
>
> Moreover, we give special recognition to the following submissions:
>
>
> * *Catena*, for its agile framework approach and side-channel resistance.
>
> * *Lyra2*, for its elegant sponge-based design, and alternative
> approach to side-channel resistance.
>
> * *Makwa*, for its unique delegation feature and its factoring-based
> security.
>
> * *yescrypt*, for its rich feature set and easy upgrade path from scrypt.
>
>
> We will also endorse those four algorithms for scenarios in which
> their unique capabilities are essential, although the Argon2-based
> winner will be our main recommendation. Like for Argon2, the current
> versions are not the final versions: their designers are permitted and
> encouraged to submit improvements to their design, and the panel may
> ask for specific changes.
>
>
> We expect the winner and the special recognitions to be finalized by
> end of Q3 2015.
>
>
> Thanks to all PHC contributors!
> https://password-hashing.net/



Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ