Paper 2015/678

Optimizing MAKWA on GPU and CPU

Thomas Pornin

Abstract

We present here optimized implementations of the MAKWA password hashing function on an AMD Radeon HD 7990 GPU, and compare its efficiency with an Intel i7 4770K CPU for systematic dictionary attacks. We find that the GPU seems to get more hashing done for a given budget, but not by a large amount (the GPU is less than twice as efficient as the CPU). Raising the MAKWA modulus size to 4096 bits, instead of the default 2048 bits, should restore the balance in favour of the CPU. We also find that power consumption, not hardware retail price, is likely to become the dominant factor for industrialized, long-term attacking efforts.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Password Hashing Competition
Contact author(s)
pornin @ bolet org
History
2015-07-06: received
Short URL
https://ia.cr/2015/678
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/678,
      author = {Thomas Pornin},
      title = {Optimizing MAKWA on GPU and CPU},
      howpublished = {Cryptology ePrint Archive, Paper 2015/678},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/678}},
      url = {https://eprint.iacr.org/2015/678}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.