Scrypt Is Maximally Memory-Hard

被引:52
作者
Alwen, Joel [1 ]
Chen, Binyi [2 ]
Pietrzak, Krzysztof [1 ]
Reyzin, Leonid [3 ]
Tessaro, Stefano [2 ]
机构
[1] IST Austria, Klosterneuburg, Austria
[2] UC Santa Barbara, Santa Barbara, CA USA
[3] Boston Univ, Boston, MA 02215 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III | 2017年 / 10212卷
基金
欧洲研究理事会;
关键词
Scrypt; Memory-hard functions; Password hashing; PROOFS;
D O I
10.1007/978-3-319-56617-7_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory-hard functions (MHFs) are hash algorithms whose evaluation cost is dominated by memory cost. As memory, unlike computation, costs about the same across different platforms, MHFs cannot be evaluated at significantly lower cost on dedicated hardware like ASICs. MHFs have found widespread applications including password hashing, key derivation, and proofs-of-work. This paper focuses on scrypt, a simple candidate MHF designed by Percival, and described in RFC 7914. It has been used within a number of cryptocurrencies (e.g., Litecoin and Dogecoin) and has been an inspiration for Argon2d, one of the winners of the recent password-hashing competition. Despite its popularity, no rigorous lower bounds on its memory complexity are known. We prove that scrypt is optimally memory-hard, i.e., its cumulative memory complexity (cmc) in the parallel random oracle model is Omega(n(2)w), where w and n are the output length and number of invocations of the underlying hash function, respectively. High cmc is a strong security target for MHFs introduced by Alwen and Serbinenko (STOC '15) which implies high memory cost even for adversaries who can amortize the cost over many evaluations and evaluate the underlying hash functions many times in parallel. Our proof is the first showing optimal memory-hardness for any MHF. Our result improves both quantitatively and qualitatively upon the recent work by Alwen et al. (EUROCRYPT '16) who proved a weaker lower bound of Omega(n(2) w/log(2) n) for a restricted class of adversaries.
引用
收藏
页码:33 / 62
页数:30
相关论文
共 22 条
[1]  
Abadi M., 2005, ACM Trans. Internet Technol., V5, P299
[2]  
Abadi M., 2003, NDSS 2003
[3]  
Alwen J., 2017, EUROCRYPT
[4]  
Alwen J., 2016, Cryptology ePrint Archive, Report 2016/989
[5]   High Parallel Complexity Graphs and Memory-Hard Functions [J].
Alwen, Joel ;
Serbinenko, Vladimir .
STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, :595-603
[6]   Efficiently Computing Data-Independent Memory-Hard Functions [J].
Alwen, Joel ;
Blocki, Jeremiah .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 :241-271
[7]   On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model [J].
Alwen, Joel ;
Chen, Binyi ;
Kamath, Chethan ;
Kolmogorov, Vladimir ;
Pietrzak, Krzysztof ;
Tessaro, Stefano .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 :358-387
[8]  
[Anonymous], 2016, The Scrypt Password-based Key Derivation Function
[9]  
[Anonymous], 1996, TECHNICAL REPORT
[10]  
Biryukov A., 2016, Argon2 password hash