A Memory-hard KDF (password hashing), e.g., Scrypt, Argon2, should publish the best known time-memory tradeoff. (This is probably already done.) Any improvement discovered later is akin to a successful attack.
Inspired by this conversation by the author of Scrypt indicating that he was aware of a TMTO in Scrypt, considering it a feature. (linked from Drupal issue 1201444).
No comments :
Post a Comment