Date: Sun, 31 Aug 2014 09:32:22 +0400 From: Solar Designer <solar@...nwall.com> To: announce@...ts.openwall.com Subject: [openwall-announce] Energy-efficient bcrypt cracking (Passwords^14, Skytalks, WOOT '14 slides and paper); crypt_blowfish 1.3 Hi, I am being a bit late to post these, but better late than never: 1. Katja Malvoni has given 3 talks at conferences in the US earlier in August: at PasswordsCon Las Vegas, Skytalks, and USENIX WOOT '14. We've also submitted an academic paper to WOOT. All of these reflect progress we made at the "Energy-efficient bcrypt cracking" project since last year. Here are the new slides, download links, and YouTube video link: http://www.openwall.com/presentations/Passwords14-Energy-Efficient-Cracking/ The talk video includes a live demo of bcrypt hash cracking with modified John the Ripper on several of the energy-efficient boards. For reference, here's last year's announcement: http://www.openwall.com/lists/announce/2013/12/03/1 New since last year are much improved results for FPGAs, in particular for Xilinx Zynq 7020 and 7045. The latter achieves what's probably the highest bcrypt cracking speed per chip that has been actually demonstrated so far (for any kind of chip, including CPUs and GPUs), as well as the highest energy-efficiency, although indeed even higher speeds are currently possible (e.g. on FPGAs that are bigger yet). In particular, for bcrypt cost 5 the speed on Zynq 7045 is 20538 c/s, and for cost 12 it is 226 c/s (higher efficiency than for cost 5). Similarly expensive Xeon E5-2670 is 2.4x to 3.3x slower than Zynq 7045 on this test, yet consumes ~20x more power; GPUs are way behind. The inexpensive Zynq 7020 now achieves speeds that are on par with CPUs and GPUs, but at much greater energy efficiency. We're going to continue the project, targeting other FPGAs and multi-FPGA boards. We continue to recommend use of bcrypt for now. The bcrypt cracking speedups and energy efficiency improvements achieved so far are very important, but are not fatal to its continued use for a while longer. This is a short-term recommendation. 2. I released crypt_blowfish 1.3 back in July: http://www.openwall.com/crypt/ Version 1.3 adds support for the $2b$ prefix introduced in OpenBSD 5.5+, which behaves exactly the same as crypt_blowfish's $2y$ did and still does. This way, full compatibility with OpenBSD's bcrypt is achieved at the new $2b$ prefix. crypt_blowfish 1.3 is already included in Owl-current builds (including the ISO images) made in July. I'd like to thank the OpenBSD project for providing this avenue for us to achieve full compatibility between the implementations despite of the mistakes made previously. To be more confident there is indeed full compatibility, I wrote and ran a test suite cross-testing the two implementations, including on weird and invalid inputs. For the curious, it can now be found as bcrypt-tester-1.0.tar.gz under: http://download.openwall.net/pub/projects/crypt/ although there should be no need to run it (again). As usual, any feedback is welcome. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.