2016
DOI: 10.1007/978-3-662-49896-5_13
|View full text |Cite
|
Sign up to set email alerts
|

On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…Thus, the cost of purchasing/renting hardware for password cracking, approximated by a functions Area x Time (AT) complexity, can be substantial for an attacker. Specifically, AT complexity of SCRYPT [9], scales quadratically with the number of time steps [39]. Thus, as discussed in Section 2, we estimate k $ = τC H + τ 2 C mem , where C H ≈ $7 × 10 −15 [29] and C mem ≈ C H 3000 as in [30], [31].…”
Section: Memory Hard Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the cost of purchasing/renting hardware for password cracking, approximated by a functions Area x Time (AT) complexity, can be substantial for an attacker. Specifically, AT complexity of SCRYPT [9], scales quadratically with the number of time steps [39]. Thus, as discussed in Section 2, we estimate k $ = τC H + τ 2 C mem , where C H ≈ $7 × 10 −15 [29] and C mem ≈ C H 3000 as in [30], [31].…”
Section: Memory Hard Functionsmentioning
confidence: 99%
“…Data dependent MHFs such as SCRYPT [9] have the previously mentioned side-channel vulnerabilities. Even so, SCRYPT has been found to be optimally memory hard with respect to AT complexity [39], [89]. The authors of Argon2 [18], winner of the password hashing competition [8], now recommend running in hybrid mode Argon2id to balance side-channel resistance and resistance to iMHF attacks.…”
Section: Data (In)dependent Memory Hard Functionsmentioning
confidence: 99%
“…We remark that the way our hard function f RO makes use of the random oracle is quite standard and analogous to several existing cryptographic constructions (e.g., [4,5,52]), so it is unlikely that the random oracle methodology fails to apply to our hard function f RO (see more discussion in Section 1.2). Thus, one way to interpret our result is that either f h indeed shows a fundamental limitation of parallelization in the MPC model, or gives a natural counter-example for the random oracle methodology (which would be surprising).…”
Section: Our Results and Techniquesmentioning
confidence: 99%
“…There exists a universal constant c > 1 such that for any sufficiently large n > 0, let RO : {0, 1} n → {0, 1} n be a random oracle and for any n ≤ S < 2 O(n ) and S ≤ T < 2 O(n 14 ) , consider the function Line RO n,w,u,v : {0, 1} uv → {0, 1} n where w = T , v = S/u and u = n/3. Let A RO be a deterministic massively parallel computation with m < 2 O(n ) machines, local memory of size s ≤ S/c and a number of at most q < 2 n/4 random oracle queries per round per machine.…”
mentioning
confidence: 99%
“…Balloon is a data-independent memory-hard PHS that provides higher security than the first version of Argon2i. Balloon is based on random sandwich graphs [22,104]. The t_cost parameter determines the number of rounds of computation and can be increased to enhance security without affecting the memory requirements.…”
Section: Balloon Phsmentioning
confidence: 99%