[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: scrypt time-memory tradeoff
Colin,
Thanks for replying! I understand that you're very busy these days.
On Sun, Nov 18, 2012 at 03:07:54AM -0800, Colin Percival wrote:
> On 11/16/12 17:20, Solar Designer wrote:
> > On Thu, Jun 30, 2011 at 05:48:01PM -0700, Colin Percival wrote:
> >> The design of scrypt puts a lower bound on the area-time product -- you can
> >> use less memory and more CPU time, but the ratios stay within a constant
> >> factor of each other, so for the worst-case attacker (ASICs) the cost per
> >> password attempted stays the same.
> >
> > This doesn't appear to be exactly the case.
>
> Note the words "constant factor". ;-)
Fair enough.
> This is correct, and gives you asymptotically a 2x reduction in area-time
> cost during the second phase.
Yes, but that's 4x for scrypt overall.
> Which falls within the definition of "constant
> factor", and was taken into account in the cost estimates in the paper.
Was it? That's good news. IIRC, when I tried repeating your cost
calculations ~2 years ago, I managed to arrive at numbers in your paper
without taking this trade-off into account. So it must be one of: I
made an error back then, I do not recall correctly, or you did not
actually take this into account. Should we verify those numbers now?
Alexander