Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130317222802.GA10730@openwall.com>
Date: Mon, 18 Mar 2013 02:28:02 +0400
From: Solar Designer <solar@...nwall.com>
To: crypt-dev@...ts.openwall.com
Subject: Re: scrypt TMTO defeater

Here's another attack on this kind of TMTO defeater:

On Mon, Sep 10, 2012 at 06:27:44AM +0400, Solar Designer wrote:
> For context, here's Anthony Ferrara's comment that I am referring to:
> 
> http://drupal.org/node/1201444#comment-4675994
> 
> Here's an attack on Anthony's tradeoff defeater ("simply writing to V_j
> in the second loop"):
> 
> Assume that we don't want to use the tradeoff to its fullest, but rather
> just halve our memory needs.  Without the tradeoff defeater, this is
> accomplished by storing every other V_j in an array that is twice
> smaller than original.  The odd-indexed V_j's are then recomputed as
> needed from the preceding values that we did store.
> 
> Now, with the tradeoff defeater we can't recompute these values like
> that because the preceding value might have been modified by prior
> iterations of the second loop.  Or can we?  Actually, quite often we
> can: by the time the second loop terminates, it will have modified only
> about 63% of V elements.  And only 39% when we're at N/2 iterations.
> 
> Of course, "quite often" is not sufficient for proper computation of the
> entire scrypt, so we do need to store the entire V array (not just its
> half) somewhere.

... and then I went on to describe the hot/cold approach:
http://www.openwall.com/lists/crypt-dev/2012/09/10/3

However, since we only write into about 63% of V elements, we only have
to store this many.  We may index them via a hash table (yes, this means
we'll need some more memory) and we'll also need to store some elements
of the original V array (as computed by SMix's first loop) - e.g., every
8th element.  This way, we'll reduce our memory needs to about 76% of
original (not counting memory consumed by the hash table, which might
not be much) and pay for it by doing 8x more computation in SMix's
second loop, or 4.5x more computation total (not including hash table
lookups overhead).  In some cases, this tradeoff may be worthwhile (when
the attacker is constrained to a device with a disproportionate amount
of computing power for the device's memory size and/or bandwidth).

Additionally, if the attacker runs multiple such instances in parallel
and (de)synchronizes them in a smart way, their average memory usage per
instance will be less than the 76% figure.  If we consider SMix's second
loop only, it may be about 52% of original.  If we consider both loops
and assume they take equal time to run, it may be 32% of original.  So
the attacker would reduce memory needs by a factor of 3 with only a 4.5x
increase in computation.  This may be worthwhile on even more devices
than the example above.

The (de)synchronization trick is also applicable to the original scrypt
(although it makes less of a difference there), where SMix's first loop
does not need all of the memory at once.  Only SMix's second loop was
included in Colin's attack cost estimates, but for practical purposes I
like to consider both loops.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.