Scrypt Password Based Key Derivation Function - Cryptography

Поделиться
HTML-код
  • Опубликовано: 1 окт 2024
  • A more advanced topic, we go over the Scrypt password based key derivation function which is used in popular cryptocurrencies like Litecoin!

Комментарии • 18

  • @branpurn
    @branpurn 4 года назад +4

    This seems to be the gold standard on Scrypt on RUclips, thanks!

  • @TheLifeOfaBichon
    @TheLifeOfaBichon Год назад

    I've been using the Scrypt Algorithm for my full disk encrypted hard drives for two years now. The more RAM & more newer model CPU you have. You can create the time that a hacker has to try each brute force attack per attempt. Take note, this also slows down the legitimate user to try also the same times per entering the password in. I got it to where a hacker could only try one try every 4 minutes and 54 seconds per each password cracking attempt. The NSA fears strong encryption, what's really the best thing against them cracking our encryption. Is counter measures and fail safes. This is exactly what the scrypt algorithm does.

  • @manirkm1
    @manirkm1 7 лет назад +3

    Noob question from a crypto-noob: At 9:05 I thought private keys are not to be shared? or did you mean that in some other way?

    • @skibbli
      @skibbli 7 лет назад +1

      MAC / HMAC do not require the use of a private key in the same sense as ECDSA or RSA. The "private key" in his example is better described as a shared secret between the two parties, because this scenario is not asymmetric encryption. Merely a hash function.
      This is often useful when authenticating with a website's API, as an extra measure to prevent tampering, and providing key expiry and special permissions.
      It's important to note: In the case of RSA and ECDSA, along with many other asymmetric encryption algorithms where you must generate a key PAIR (private and public), you do NOT share your private key under any circumstance.

    • @manirkm1
      @manirkm1 7 лет назад

      Got it, Thanks for the reply

    • @bengregori2911
      @bengregori2911 4 года назад

      ​@@skibbli Building on this, would this method be vulnerable to a MITM attack? If someone can intercept the shared secret, then the message can be decrypted. I suppose that N, R, P, and dkLens cannot be extracted from the key to re-encrypt the message once intercepted and therefore is tamper-resistant, but wouldn't it still be readable by an attacker?

  • @alaacharara8980
    @alaacharara8980 9 месяцев назад

    ❤❤❤❤

  • @johanna31278
    @johanna31278 2 года назад

    It's important to say, that a MAC is missing the security goal for alice to prove to third-party that a message is created by bob, because it also could be created by alice herself.
    MACs only prove for alice, that a message is created by bob, because alice knows, it was not created by herself.

  • @alexanderdemerdzhiev2957
    @alexanderdemerdzhiev2957 8 лет назад +1

    Thank you! This video is very well explainded.

  • @viniciussuic
    @viniciussuic 6 лет назад +1

    Great explanation, thanks for the video

  • @linternetsansfil4152
    @linternetsansfil4152 4 года назад

    It's me or you confused rainbow table and brute fore all the time ?

  • @baatar
    @baatar 5 лет назад

    How do the iterations actually work? Are you using the salt to produce a psuedorandom number during each iteration in conjunction with the loop function? Is the loop hashing the input each iteration with some other input like a number, random number, previous hash output, etc?

    • @yusufefl
      @yusufefl 5 лет назад

      www.tarsnap.com/scrypt/scrypt.pdf .. SMIX is a kind of block hasher. Think your message is divided into blocks. Find the hash of the first block XOR it with the next block and HASH again. The used hashing function is Salsa20. So it is impossible to find the solution without iterating through each block sequentially. So this makes the process to be hardly parallelized.

  • @albertoalemany7550
    @albertoalemany7550 8 лет назад

    Thanks! It's been easy to understand in the way that you explained it.

  • @신동평-o7z
    @신동평-o7z 6 лет назад

    thanks a lot !! great video!!

  • @thinkinganame6173
    @thinkinganame6173 6 лет назад

    is there a standard doc for this algo?

    • @yusufefl
      @yusufefl 5 лет назад

      www.tarsnap.com/scrypt/scrypt.pdf