Paper 2015/227
Tradeoff Cryptanalysis of Memory-Hard Functions
Alex Biryukov and Dmitry Khovratovich
Abstract
We explore time-memory and other tradeoffs for memory-hard functions, which are supposed to impose significant computational and time penalties if less memory is used than intended. We analyze three finalists of the Password Hashing Competition: Catena, which was presented at Asiacrypt 2014, \textsf{yescrypt} and Lyra2.
We demonstrate that Catena's proof of tradeoff resilience is flawed, and attack it with a novel \emph{precomputation tradeoff}. We show that using
Metadata
- Available format(s)
-
PDF
- Publication info
- Published by the IACR in ASIACRYPT 2015
- Keywords
- password hashingmemory-hardCatenatradeoffcryptocurrencyproof-of-work
- Contact author(s)
-
alex biryukov @ uni lu
khovratovich @ gmail com - History
- 2015-09-28: revised
- 2015-03-11: received
- See all versions
- Short URL
- https://ia.cr/2015/227
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/227, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Tradeoff Cryptanalysis of Memory-Hard Functions}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/227}, year = {2015}, url = {https://eprint.iacr.org/2015/227} }