[148764] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] A modification to scrypt to reduce side channel

daemon@ATHENA.MIT.EDU (Jerry Leichter)
Fri Dec 27 12:01:01 2013

X-Original-To: cryptography@metzdowd.com
From: Jerry Leichter <leichter@lrw.com>
In-Reply-To: <CAOLP8p55YPV0VBptL=O=dPGaN8Zft9UbTbFe8bPJBDY0bGSUrw@mail.gmail.com>
Date: Fri, 27 Dec 2013 06:12:46 -0500
To: Bill Cox <waywardgeek@gmail.com>
Cc: =?iso-8859-1?Q?Kriszti=E1n_Pint=E9r?= <pinterkr@gmail.com>,
	Colin Percival <cperciva@tarsnap.com>,
	Cryptography <cryptography@metzdowd.com>,
	Arnold Reinhold <agr@me.com>, scrypt@tarsnap.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


--===============1417760574174305518==
Content-Type: multipart/alternative; boundary="Apple-Mail=_009341A0-BCFB-429C-8EB7-409C5078C574"


--Apple-Mail=_009341A0-BCFB-429C-8EB7-409C5078C574
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

On Dec 26, 2013, at 8:09 PM, Bill Cox wrote:
> ....  If we use a memory hard KDF that hashes 4 GB with RNG data on =
our PCs in 1 second....
OK, so now we've moved from abstraction to a concrete proposal.

And just who would use such a KDF?  Tying up 4GB for a second is a very =
expensive proposition on a server.  People have to manage thousands of =
logins a second, so you're talking about devoting Terabytes of main =
memory - not disk or SSD - *just to logins*.

You've suggested doing the KDF computation on the client.  How many =
clients have 4GB of free memory?  I've got a laptop with 8GB of memory.  =
WHen in active use, it never has even 2GB free.  Maybe my laptop can do =
the computation - but it will take a while because it'll have to swap =
stuff out.  (And of course then they'll have to swap it back in.)  I see =
this happen periodically when I've got a bit too much stuff running, and =
it ain't pretty.  Hardly any user would be willing to accept the =
performance loss.

As for portable devices - I'm not sure any of the actually *have* 4GB of =
RAM in total.  And the power costs of pegging the CPU for a second are =
non-trivial, too.  So basically you're writing them all off.

The parameters you've suggested basically limit secure communication to =
someone with the NSA's resources.  :-)
                                                        -- Jerry


--Apple-Mail=_009341A0-BCFB-429C-8EB7-409C5078C574
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div><div>On Dec 26, 2013, at 8:09 PM, Bill Cox =
wrote:</div><blockquote type=3D"cite"><div dir=3D"ltr"><div =
class=3D"gmail_extra"><div class=3D"gmail_quote"><div><font =
class=3D"Apple-style-span" color=3D"#000000">...</font>. &nbsp;If we use =
a memory hard KDF that hashes 4 GB with RNG data on our PCs in 1 =
second....</div></div></div></div></blockquote>OK, so now we've moved =
from abstraction to a concrete proposal.</div><div><br></div><div>And =
just who would use such a KDF? &nbsp;Tying up 4GB for a second is a very =
expensive proposition on a server. &nbsp;People have to manage thousands =
of logins a second, so you're talking about devoting Terabytes of main =
memory - not disk or SSD - *just to =
logins*.</div><div><br></div><div>You've suggested doing the KDF =
computation on the client. &nbsp;How many clients have 4GB of free =
memory? &nbsp;I've got a laptop with 8GB of memory. &nbsp;WHen in active =
use, it never has even 2GB free. &nbsp;Maybe my laptop can do the =
computation - but it will take a while because it'll have to swap stuff =
out. &nbsp;(And of course then they'll have to swap it back in.) &nbsp;I =
see this happen periodically when I've got a bit too much stuff running, =
and it ain't pretty. &nbsp;Hardly any user would be willing to accept =
the performance loss.</div><div><br></div><div>As for portable devices - =
I'm not sure any of the actually *have* 4GB of RAM in total. &nbsp;And =
the power costs of pegging the CPU for a second are non-trivial, too. =
&nbsp;So basically you're writing them all =
off.</div><div><br></div><div>The parameters you've suggested basically =
limit secure communication to someone with the NSA's resources. =
&nbsp;:-)</div><div><div>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; -- Jerry</div><div><br></div></div></body></html>=

--Apple-Mail=_009341A0-BCFB-429C-8EB7-409C5078C574--

--===============1417760574174305518==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============1417760574174305518==--

home help back first fref pref prev next nref lref last post