Scrypt: Harnessing Memory (2024)

By Indigo in Mining

Scrypt is a memory-hard function designed to protect against denial-of-service attacks and for metering clients' access. It is resistant to specialized hardware like ASICs and FPGAs, making it more secure than other algorithms.

Scrypt: Harnessing Memory (1)

Scrypt is a memory-hard function (MHF) innovated by Colin Percival. Often found in applications like password hashing, key derivation, and proofs-of-work, Scrypt requires a substantial amount of memory for computation, thus deterring many parallel evaluations at once. Originally, Scrypt was designed to hinder the efficiency of specialized hardware, reducing the evaluation cost disparity between ordinary users and potential attackers. This unique property makes it an effective safeguard for proofs-of-work in the digital currency arena.

The Memory-Hard Advantage of Scrypt

Scrypt is designed to be resistant to specialized hardware, such as Application-Specific Integrated Circuits (ASICs) or Field-Programmable Gate Arrays (FPGAs). The evaluation of Scrypt requires significant memory, a resource that is general-purpose and thus comparably priced across platforms. As a result, it is challenging to develop a dedicated device for a swift evaluation of the function since the memory required is consistent across different platforms. In simpler terms, Scrypt is hard to evaluate quickly due to the extensive memory requirement and its uniform cost across platforms.

SHA256 ASICs and Scrypt: A Mismatch

While Scrypt was designed to be resistant to hardware like ASICs, it's important to clarify that this resistance is not absolute. As of the mid-2010s, specialized ASIC miners for Scrypt have been developed. While Scrypt can resist these technologies to some degree, ASICs and similar specialized hardware can still operate on Scrypt to a limited extent. This property of Scrypt makes it a preferred choice for certain cryptocurrency mining as it discourages centralization of power.

The Security Payoff of Scrypt

Scrypt's primary security advantage stems from its memory-hard nature, increasing its resilience against specialized hardware attacks such as those from ASICs and FPGAs. Although not entirely impervious to such hardware, the large memory requirement makes Scrypt less susceptible to brute-force attacks that aim to compute many password possibilities. Additionally, Scrypt is designed for speed, making it ideal for interactive applications, like website logins, without causing significant user delay.

Resources

I never truly understood what the scrypt parameters 𝑁, 𝑟 and 𝑝 meant. So I read the paper and wrote it up for you. https://t.co/BL2a0BWAWH

— Filippo Valsorda (@FiloSottile) October 4, 2017

GitHub - Tarsnap/scrypt: The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.

The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative f...

Scrypt: Harnessing Memory (2)GitHubTarsnap

Scrypt: Harnessing Memory (3)

Scrypt is Maximally Memory-Hard

Scrypt: Harnessing Memory (4)

Scrypt: Harnessing Memory (5)

scrypt - Wikipedia

Scrypt: Harnessing Memory (6)Wikimedia Foundation, Inc.Contributors to Wikimedia projects

Scrypt: Harnessing Memory (7)

Scrypt: Harnessing Memory (2024)
Top Articles
How do I interpret my logic test result? | Alva Help Center
Real GDP per capita Comparison
Duralast Gold Cv Axle
Section 4Rs Dodger Stadium
Methstreams Boxing Stream
Pangphip Application
7543460065
Slay The Spire Red Mask
Hover Racer Drive Watchdocumentaries
Elle Daily Horoscope Virgo
Robert Malone é o inventor da vacina mRNA e está certo sobre vacinação de crianças #boato
OpenXR support for IL-2 and DCS for Windows Mixed Reality VR headsets
Raleigh Craigs List
Painting Jobs Craigslist
No Hard Feelings Showtimes Near Cinemark At Harlingen
The Superhuman Guide to Twitter Advanced Search: 23 Hidden Ways to Use Advanced Search for Marketing and Sales
DoorDash, Inc. (DASH) Stock Price, Quote & News - Stock Analysis
Condogames Xyz Discord
What Happened To Anna Citron Lansky
Sport-News heute – Schweiz & International | aktuell im Ticker
Nhl Wikia
Prosser Dam Fish Count
Parent Resources - Padua Franciscan High School
Urban Airship Expands its Mobile Platform to Transform Customer Communications
Cocaine Bear Showtimes Near Regal Opry Mills
Certain Red Dye Nyt Crossword
Breckiehill Shower Cucumber
Anesthesia Simstat Answers
Ups Drop Off Newton Ks
Perry Inhofe Mansion
Hotel Denizen Mckinney
Gwen Stacy Rule 4
Babbychula
Skroch Funeral Home
Audi Q3 | 2023 - 2024 | De Waal Autogroep
Timothy Kremchek Net Worth
Boone County Sheriff 700 Report
1v1.LOL Game [Unblocked] | Play Online
Atlanta Musicians Craigslist
Second Chance Apartments, 2nd Chance Apartments Locators for Bad Credit
968 woorden beginnen met kruis
Craigslist Pets Plattsburgh Ny
Hovia reveals top 4 feel-good wallpaper trends for 2024
Powerspec G512
Gamestop Store Manager Pay
Shell Gas Stations Prices
Tommy Bahama Restaurant Bar & Store The Woodlands Menu
Lorton Transfer Station
Craigslist Psl
Besoldungstabellen | Niedersächsisches Landesamt für Bezüge und Versorgung (NLBV)
2121 Gateway Point
How To Find Reliable Health Information Online
Latest Posts
Article information

Author: Laurine Ryan

Last Updated:

Views: 6249

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Laurine Ryan

Birthday: 1994-12-23

Address: Suite 751 871 Lissette Throughway, West Kittie, NH 41603

Phone: +2366831109631

Job: Sales Producer

Hobby: Creative writing, Motor sports, Do it yourself, Skateboarding, Coffee roasting, Calligraphy, Stand-up comedy

Introduction: My name is Laurine Ryan, I am a adorable, fair, graceful, spotless, gorgeous, homely, cooperative person who loves writing and wants to share my knowledge and understanding with you.