this is wonderful :shock:

General technological topics without their own forum go here

this is wonderful :shock:

Post by druidboychickenwingz on Wed Apr 24, 2013 1:42 am
([msg=75303]see this is wonderful :shock:[/msg])

druidboychickenwingz
New User
New User
 
Posts: 1
Joined: Wed Apr 24, 2013 1:38 am
Blog: View Blog (0)


Re: this is wonderful :shock:

Post by brinks56 on Thu Apr 25, 2013 4:56 am
([msg=75348]see Re: this is wonderful :shock:[/msg])

As someone just getting into crypto in school a lot of this article was beyond my education level, but this is pretty crazy. Lots of good stuff to go learn about in that article.

Can someone answer a question for me though? At the end of the article they talk about Bcrypt, PBKDF2 and another agorithm and how the cluster would be able to perform far fewer guesses on them. Is this because of additional iterations performed (and other stuff done that I am not familiar with yet), or do they also increase the size of the hash in the ? I tried to look a bit to find out but I could not be sure.

Thanks for the great article. Only found this site today and I love it already.
brinks56
New User
New User
 
Posts: 9
Joined: Wed Apr 24, 2013 8:43 pm
Blog: View Blog (0)


Re: this is wonderful :shock:

Post by sordidarchetype on Thu Apr 25, 2013 8:58 am
([msg=75353]see Re: this is wonderful :shock:[/msg])

brinks56 wrote:Can someone answer a question for me though? At the end of the article they talk about Bcrypt, PBKDF2 and another agorithm and how the cluster would be able to perform far fewer guesses on them. Is this because of additional iterations performed (and other stuff done that I am not familiar with yet), or do they also increase the size of the hash in the ? I tried to look a bit to find out but I could not be sure. .


bcrypt, pbkdf2 and sha512 are far more resource intensive than say a sha1 or MD5. They requires more calculations, more cycles, more memory, so of course they will take longer to calculate. As a result, you will have less full completions in the same amount of time as a lighter algorithm such as MD5.

There are additional factors to consider. Bcrypt, for example, is not considered "GPU-friendly" and will actually run slow on GPUs than CPUs. This is because, although GPUs are good at some things, at the moment they suffer in other areas, like 64-bit operations, data-dependent branching, and large memory operations.

Just as a note, simply increasing iterations will not always give you the results you expect. Bcrypt (and to some degree pbkdf2) is considered an adaptive algorithm, and can cycle though rounds (iterations) without adversely affecting the algorithm. MD5, on the other hand, is not an adaptive algorithm, and as you further iterate the algorithm, you will actually increase the collision domains of your hashes, weakening the hash exponentially with each iteration.
User avatar
sordidarchetype
New User
New User
 
Posts: 47
Joined: Wed Dec 22, 2010 12:46 pm
Blog: View Blog (0)


Re: this is wonderful :shock:

Post by brinks56 on Thu Apr 25, 2013 2:54 pm
([msg=75378]see Re: this is wonderful :shock:[/msg])

sordidarchetype, Thanks for the response. That clarifies things for me. I have only learning about ipSec and crypto for 2 months and there is so much stuff to learn about that I find myself not delving deep enough into certain topics. I did a bunch more research on this since last night.
brinks56
New User
New User
 
Posts: 9
Joined: Wed Apr 24, 2013 8:43 pm
Blog: View Blog (0)


Re: this is wonderful :shock:

Post by sordidarchetype on Thu Apr 25, 2013 3:20 pm
([msg=75380]see Re: this is wonderful :shock:[/msg])

You may want to read "Applied Cryptography", by Bruce Schneier. He is definitely a name to remember if you are serious about the field of cryptography, and his series of books are fantastic.
User avatar
sordidarchetype
New User
New User
 
Posts: 47
Joined: Wed Dec 22, 2010 12:46 pm
Blog: View Blog (0)



Return to General

Who is online

Users browsing this forum: No registered users and 0 guests

cron