Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20121118111957.GA22502@openwall.com>
Date: Sun, 18 Nov 2012 15:19:57 +0400
From: Solar Designer <solar@...nwall.com>
To: Colin Percival <cperciva@...snap.com>
Cc: scrypt@...snap.com, crypt-dev@...ts.openwall.com
Subject: Re: scrypt time-memory tradeoff

Colin,

Thanks for replying!  I understand that you're very busy these days.

On Sun, Nov 18, 2012 at 03:07:54AM -0800, Colin Percival wrote:
> On 11/16/12 17:20, Solar Designer wrote:
> > On Thu, Jun 30, 2011 at 05:48:01PM -0700, Colin Percival wrote:
> >> The design of scrypt puts a lower bound on the area-time product -- you can
> >> use less memory and more CPU time, but the ratios stay within a constant
> >> factor of each other, so for the worst-case attacker (ASICs) the cost per
> >> password attempted stays the same.
> > 
> > This doesn't appear to be exactly the case.
> 
> Note the words "constant factor". ;-)

Fair enough.

> This is correct, and gives you asymptotically a 2x reduction in area-time
> cost during the second phase.

Yes, but that's 4x for scrypt overall.

> Which falls within the definition of "constant
> factor", and was taken into account in the cost estimates in the paper.

Was it?  That's good news.  IIRC, when I tried repeating your cost
calculations ~2 years ago, I managed to arrive at numbers in your paper
without taking this trade-off into account.  So it must be one of: I
made an error back then, I do not recall correctly, or you did not
actually take this into account.  Should we verify those numbers now?

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.