[Cryptography] I posted a memory-hard key stretching algorithm on github
Bill Cox
waywardgeek at gmail.com
Mon Dec 30 15:05:14 EST 2013
It's at:
https://github.com/waywardgeek/keystretch
If this algorithm isn't too lame, I'll enter it in the password hashing
competition in January. There isn't much time for feedback or code
development, so if you're interested in these algorithms, please let me
know your thoughts on this one. Essentially, I've upped the pre-hashing of
the password to 4096 SHA-256 rounds, and replaced the memory hashing
function of scrypt, Salsa20/8, with a simple hack that seems to run 8X
faster while being unpredictable enough.
The only other entry I've read about so far is based on Blake2, which is a
nice improvement over Salsa20, I think, but like scrypt, it spends most of
it's time hashing rather than filling the memory bandwidth. I'm not sure a
cryptographically strong hash is called for, so I'm suggesting using a
simpler hash that seems to work well enough. Any thoughts welcome.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20131230/40842931/attachment.html>
More information about the cryptography
mailing list