TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Password Hashing Competition winner and special recognitions

89 pointsby earthrisealmost 10 years ago

5 comments

ReidZBalmost 10 years ago
Hmm. I didn&#x27;t expect this announcement this soon - at least on the public mailing list, the notion of a winner still seemed very far away. Just 18 days ago: <a href="https:&#x2F;&#x2F;groups.google.com&#x2F;forum&#x2F;#!searchin&#x2F;crypto-competitions&#x2F;phc$20winners&#x2F;crypto-competitions&#x2F;E99ZyJATo6E&#x2F;plkmr4sQQ8QJ" rel="nofollow">https:&#x2F;&#x2F;groups.google.com&#x2F;forum&#x2F;#!searchin&#x2F;crypto-competitio...</a><p>Anyway, as best as I could tell, the consensus on the public mailing list was that the best case for a singular winner would be an amalgamation of four finalists: Argon2, Lyra2, Catena, and yescrypt. Each of them has some properties that are desirable. I&#x27;m curious to what extent Argon2 will be modified - and especially curious if the final spec will have tunable parameters &#x2F; multiple modes or be a one-size-fits-all deal.<p>Edit: If you&#x27;re interested in more information, a decent starting place is this paper: <a href="https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2014&#x2F;881.pdf" rel="nofollow">https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2014&#x2F;881.pdf</a> If you folks want more reading material, I can pull some emails from the mailing list
aglalmost 10 years ago
Here is the spec for the winner: <a href="https:&#x2F;&#x2F;password-hashing.net&#x2F;submissions&#x2F;specs&#x2F;Argon-v2.pdf" rel="nofollow">https:&#x2F;&#x2F;password-hashing.net&#x2F;submissions&#x2F;specs&#x2F;Argon-v2.pdf</a>
评论 #9917985 未加载
gueloalmost 10 years ago
For those like me that weren&#x27;t aware of this competition here&#x27;s their website with more info <a href="https:&#x2F;&#x2F;password-hashing.net&#x2F;" rel="nofollow">https:&#x2F;&#x2F;password-hashing.net&#x2F;</a>
tyhoalmost 10 years ago
Impressive stuff. One of the features of the winner is that you can offload the expensive computation to a client and still maintain the security you would have if it were done on the server. This should hopefully persuade people to use slow hash functions where they otherwise would not due to performance concerns.
评论 #9918457 未加载
评论 #9918413 未加载
评论 #9919325 未加载
biotalmost 10 years ago
What tools are typically used to develop these algorithms? The site has <a href="https:&#x2F;&#x2F;password-hashing.net&#x2F;faq.html#qd" rel="nofollow">https:&#x2F;&#x2F;password-hashing.net&#x2F;faq.html#qd</a> which mentions attempts to formally define the security of a good algorithm though a quick scan of the two papers indicates the definitions are mathematical properties described in English. However, when it comes to implementations is there a generally accepted language&#x2F;framework in which correctness can be proven? Haskell comes to mind as one such language which its proponents tout as ensuring correctness, though I lack the experience to determine whether this means &quot;your broken algorithm runs 100% correctly&quot; vs. &quot;a broken algorithm will not compile&quot;.
评论 #9918831 未加载
评论 #9920081 未加载