This shows you the differences between two versions of the page.
|
yescrypt [2018/04/05 17:18] solar created with content from the PHC wiki as-is |
yescrypt [2018/04/05 17:28] (current) solar converted into an initial community wiki page |
||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== yescrypt ====== | + | ====== yescrypt user community resources ====== |
| - | ==== Designer ==== | + | [[http://www.openwall.com/yescrypt/|yescrypt]] is a password-based key derivation function (KDF) and password hashing scheme. It builds upon Colin Percival's scrypt. This implementation is able to compute native yescrypt hashes as well as classic scrypt. |
| - | * Alexander Peslyak | + | |
| - | ==== Download Submission ==== | + | Right now, this is primarily a copy of the content from the [[https://password-hashing.net|PHC]] [[https://password-hashing.net/wiki/doku.php/start|wiki]], but it should probably be moved to a sub-page and this page reused for links to resources related to yescrypt. |
| - | * [[https://password-hashing.net/submissions/yescrypt-v2.tar.gz|Version 2]] | + | |
| + | ===== Links ===== | ||
| + | |||
| + | ==== Presentations ==== | ||
| + | |||
| + | * [[http://www.openwall.com/presentations/BSidesLjubljana2017-Yescrypt-Large-scale-Password-Hashing/|yescrypt: large-scale password hashing]] (BSidesLjubljana 2017) | ||
| + | * [[http://www.openwall.com/presentations/PHDays2014-Yescrypt/|yescrypt: password hashing scalable beyond bcrypt and scrypt]] (PHDays 2014) | ||
| + | |||
| + | ==== Discussion threads ==== | ||
| + | |||
| + | * [[http://www.reddit.com/r/netsec/duplicates/26d52c/yescrypt_password_hashing_scalable_beyond_bcrypt/|yescrypt discussed on reddit in 2014]] | ||
| + | |||
| + | ===== yescrypt description from the PHC wiki ===== | ||
| ==== Strengths summary ==== | ==== Strengths summary ==== | ||
| Line 193: | Line 204: | ||
| The BlockMix_{Salsa20/8, r}(X) function is exactly the same as in scrypt (and is invoked with hard-coded r=1 here, regardless of yescrypt's r). The BlockMix_pwxform{Salsa20/2, S, r}(X) function is yescrypt's own, and it uses yescrypt's own pwxform in place of most uses of Salsa20/2. Please refer to the yescrypt specification document and the deliberately mostly not optimized reference implementation (yescrypt-ref.c) for how these functions, as well as the SIMD (un)shuffling, are specified. | The BlockMix_{Salsa20/8, r}(X) function is exactly the same as in scrypt (and is invoked with hard-coded r=1 here, regardless of yescrypt's r). The BlockMix_pwxform{Salsa20/2, S, r}(X) function is yescrypt's own, and it uses yescrypt's own pwxform in place of most uses of Salsa20/2. Please refer to the yescrypt specification document and the deliberately mostly not optimized reference implementation (yescrypt-ref.c) for how these functions, as well as the SIMD (un)shuffling, are specified. | ||
| - | ==== Presentation ==== | ||
| - | |||
| - | [[http://www.openwall.com/presentations/PHDays2014-Yescrypt/|yescrypt - password hashing scalable beyond bcrypt and scrypt]] presentation slides (May 2014), [[http://www.reddit.com/r/netsec/duplicates/26d52c/yescrypt_password_hashing_scalable_beyond_bcrypt/|discussed on reddit]]. | ||