This shows you the differences between two versions of the page.
yescrypt [2018/04/05 17:18] solar created with content from the PHC wiki as-is |
yescrypt [2018/04/05 17:28] (current) solar converted into an initial community wiki page |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== yescrypt ====== | + | ====== yescrypt user community resources ====== |
- | ==== Designer ==== | + | [[http://www.openwall.com/yescrypt/|yescrypt]] is a password-based key derivation function (KDF) and password hashing scheme. It builds upon Colin Percival's scrypt. This implementation is able to compute native yescrypt hashes as well as classic scrypt. |
- | * Alexander Peslyak | + | |
- | ==== Download Submission ==== | + | Right now, this is primarily a copy of the content from the [[https://password-hashing.net|PHC]] [[https://password-hashing.net/wiki/doku.php/start|wiki]], but it should probably be moved to a sub-page and this page reused for links to resources related to yescrypt. |
- | * [[https://password-hashing.net/submissions/yescrypt-v2.tar.gz|Version 2]] | + | |
+ | ===== Links ===== | ||
+ | |||
+ | ==== Presentations ==== | ||
+ | |||
+ | * [[http://www.openwall.com/presentations/BSidesLjubljana2017-Yescrypt-Large-scale-Password-Hashing/|yescrypt: large-scale password hashing]] (BSidesLjubljana 2017) | ||
+ | * [[http://www.openwall.com/presentations/PHDays2014-Yescrypt/|yescrypt: password hashing scalable beyond bcrypt and scrypt]] (PHDays 2014) | ||
+ | |||
+ | ==== Discussion threads ==== | ||
+ | |||
+ | * [[http://www.reddit.com/r/netsec/duplicates/26d52c/yescrypt_password_hashing_scalable_beyond_bcrypt/|yescrypt discussed on reddit in 2014]] | ||
+ | |||
+ | ===== yescrypt description from the PHC wiki ===== | ||
==== Strengths summary ==== | ==== Strengths summary ==== | ||
Line 193: | Line 204: | ||
The BlockMix_{Salsa20/8, r}(X) function is exactly the same as in scrypt (and is invoked with hard-coded r=1 here, regardless of yescrypt's r). The BlockMix_pwxform{Salsa20/2, S, r}(X) function is yescrypt's own, and it uses yescrypt's own pwxform in place of most uses of Salsa20/2. Please refer to the yescrypt specification document and the deliberately mostly not optimized reference implementation (yescrypt-ref.c) for how these functions, as well as the SIMD (un)shuffling, are specified. | The BlockMix_{Salsa20/8, r}(X) function is exactly the same as in scrypt (and is invoked with hard-coded r=1 here, regardless of yescrypt's r). The BlockMix_pwxform{Salsa20/2, S, r}(X) function is yescrypt's own, and it uses yescrypt's own pwxform in place of most uses of Salsa20/2. Please refer to the yescrypt specification document and the deliberately mostly not optimized reference implementation (yescrypt-ref.c) for how these functions, as well as the SIMD (un)shuffling, are specified. | ||
- | ==== Presentation ==== | ||
- | |||
- | [[http://www.openwall.com/presentations/PHDays2014-Yescrypt/|yescrypt - password hashing scalable beyond bcrypt and scrypt]] presentation slides (May 2014), [[http://www.reddit.com/r/netsec/duplicates/26d52c/yescrypt_password_hashing_scalable_beyond_bcrypt/|discussed on reddit]]. |