Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 30 Jun 2019 17:51:58 +0200
From: Solar Designer <solar@...nwall.com>
To: announce@...ts.openwall.com, yescrypt@...ts.openwall.com
Subject: yescrypt 1.1.0

Hi,

yescrypt is a password-based key derivation function (KDF) and password
hashing scheme.  It builds upon scrypt, and our implementation is able
to compute native yescrypt hashes as well as classic scrypt.

This is to announce a major update of yescrypt released today as 1.1.0
and a previously unannounced minor update from 1.0.2 to 1.0.3.

yescrypt 1.1.0 and 1.0.3 are available on the project's homepage:

https://www.openwall.com/yescrypt/

The changes are described in the included change log as follows:

---
	Changes made between 1.0.3 (2018/06/13) and 1.1.0 (2019/06/30).

Merged yescrypt-opt.c and yescrypt-simd.c into one source file, which is
a closer match to -simd but is called -opt (and -simd is now gone).
With this change, performance of SIMD builds should be almost unchanged,
while scalar builds should be faster than before on register-rich 64-bit
architectures but may be slower than before on register-starved 32-bit
architectures (this shortcoming may be addressed later).  This also
happens to make SSE prefetch available even in otherwise-scalar builds
and it paves the way for adding SIMD support on big-endian architectures
(previously, -simd assumed little-endian).


	Changes made between 1.0.2 (2018/06/06) and 1.0.3 (2018/06/13).

In SMix1, optimized out the indexing of V for the sequential writes.
---

In related news, yescrypt (based on its revision close to today's 1.1.0
release) became part of libxcrypt 4.2.0 and above:

https://github.com/besser82/libxcrypt

libxcrypt is used on (at least) recent Fedora and ALT Linux in lieu of
glibc's libcrypt.  Versions with yescrypt support are available starting
with Fedora 29.

Also supported in libxcrypt 4.3.0 and above are gost-yescrypt hashes,
which wrap native yescrypt into Russian GOST hashes in a way such that
cryptographic security is provably provided by GOST whereas resistance
to offline password cracking attacks is provided by yescrypt.  (This is
similar to how cryptographic security is provably provided by NIST's
SHA-256 in native yescrypt on its own.)  gost-yescrypt should only be
used where compliance with Russian cryptographic standards is required
(such as for some uses of ALT Linux distributions).

libxcrypt now also implements the crypt_rn(), crypt_ra(),
crypt_gensalt(), crypt_gensalt_rn(), and crypt_gensalt_ra() APIs that we
originally introduced in Openwall GNU/*/Linux (Owl) in 2000-2001.  As
implemented in libxcrypt, these are now additionally aware of classic
scrypt (using its implementation in yescrypt), native yescrypt, and
gost-yescrypt hashes.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.