(Very) Basic Intro to the Scrypt Hash (2024)

(Very) Basic Intro to the Scrypt Hash (1)

Lane Wagner

Posted on • Originally published at qvault.io on

(Very) Basic Intro to the Scrypt Hash (2) (Very) Basic Intro to the Scrypt Hash (3) (Very) Basic Intro to the Scrypt Hash (4) (Very) Basic Intro to the Scrypt Hash (5) (Very) Basic Intro to the Scrypt Hash (6)

This will be a basic introduction to the Scrypt hash function, or more accurately, KDF function. I will assume most of my audience is here to gain an understanding of why Scrypt is used and the basics of how it works. My goal is to explain it in a general sense, I will be omitting proofs and implementation details and instead focusing on the high-level principles.

What is Scrypt?

Scrypt is a slow-by-design hash function. Its purpose is to take some input data, and create a fingerprint of that data, but to do it very slowly. One of the best examples for its real world use case is how it is used by Qvault. That is, to take a password and create a 256-bit private key.

For example, let’s pretend your password is password1234. By using scrypt, we can extend that deterministically into a 256-bit key:

password1234 ->

AwEEDA4HCwQFAA8D

AwwHDQwPDwUOBwoO

CQACAgUJBQ0JAAYN

BAMCDQ4JCQgLDwcG

DQMDDgMKAQsNBAkL

AwsACA==

That long 256-bit key can now be used as the private key to encrypt and decrypt data using the AES-256 cipher.

(Very) Basic Intro to the Scrypt Hash (7)

Why not use the password to encrypt directly?

Most encryption algorithms, including AES-256, require that a key of sufficient length is used. By hashing the password, we get a longer and fixed-size key.

Furthermore, we chose to use the scrypt algorithm as opposed to a faster hash like SHA-256 for two reasons:

  • It is slow
  • It uses memory as well as CPU resources

The reason we want a slow hash is so that an attacker has a harder time guessing the user’s password. If an attacker is trying to brute-force their way into a vault, that means they are just guessing passwords over and over in order to break in. AES-256 is very fast, so this means the attacker would be able to try many passwords per second on a modern computer.

Because an attacker must run a scrypt hash on each password before attempting to decrypt the vault , their attack becomes so slow it will be nearly impossible to guess the password. On a relatively powerful desktop computer it takes ~1.5 seconds to hash a Qvault password because we have set the memory and computational requirements fairly high.

Scrypt Properties

Like all hashing functions, scrypt has the following properties:

  • Deterministic (Same input produces the same output every time)
  • Fixed-size output
  • Irreversible (By using the output an attacker can’t find the input)

Additionally, Scrypt has the following properties:

  • Computationally expensive and slow (It takes a long time for a computer to run the hash)
  • Memory intensive (Potentially several gigabytes of RAM is used to run the hash)

Thanks for reading! Here are some additional resources:

https://en.wikipedia.org/wiki/Scrypt

https://blog.goodaudience.com/very-basic-intro-to-hash-functions-sha-256-md-5-etc-ed721622ff8

https://medium.com/coinmonks/very-basic-intro-to-aes-256-cipher-a60104847776

https://en.bitcoinwiki.org/wiki/Scrypt

Follow us on medium! https://medium.com/qvault

By Lane Wagner

Top comments (0)

Subscribe

For further actions, you may consider blocking this person and/or reporting abuse

(Very) Basic Intro to the Scrypt Hash (2024)
Top Articles
The Habits of Financially Successful People: 13 Tips for Financial Success
Dividendenstrategie - Was ist der Dividenden Alarm?
Oldgamesshelf
Tryst Utah
Brady Hughes Justified
Instructional Resources
The UPS Store | Ship & Print Here > 400 West Broadway
Winston Salem Nc Craigslist
Ghosted Imdb Parents Guide
South Carolina defeats Caitlin Clark and Iowa to win national championship and complete perfect season
Best Theia Builds (Talent | Skill Order | Pairing + Pets) In Call of Dragons - AllClash
Embassy Suites Wisconsin Dells
Lichtsignale | Spur H0 | Sortiment | Viessmann Modelltechnik GmbH
The Haunted Drury Hotels of San Antonio’s Riverwalk
Slay The Spire Red Mask
Does Publix Have Sephora Gift Cards
R/Altfeet
Slope Unblocked Minecraft Game
Caresha Please Discount Code
Does Breckie Hill Have An Only Fans – Repeat Replay
Uky Linkblue Login
Ess.compass Associate Login
Northeastern Nupath
Craigslist Missoula Atv
Nevermore: What Doesn't Kill
Gazette Obituary Colorado Springs
Two Babies One Fox Full Comic Pdf
Bethel Eportal
Talk To Me Showtimes Near Marcus Valley Grand Cinema
Scripchat Gratis
§ 855 BGB - Besitzdiener - Gesetze
Is Poke Healthy? Benefits, Risks, and Tips
Yale College Confidential 2027
Obituaries, 2001 | El Paso County, TXGenWeb
Log in to your MyChart account
Bfri Forum
Nacogdoches, Texas: Step Back in Time in Texas' Oldest Town
Max 80 Orl
Gwen Stacy Rule 4
Spinning Gold Showtimes Near Emagine Birch Run
Blasphemous Painting Puzzle
Directions To Advance Auto
2023 Fantasy Football Draft Guide: Rankings, cheat sheets and analysis
Lake Andes Buy Sell Trade
Deezy Jamaican Food
Killer Intelligence Center Download
Craigslist Marshfield Mo
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Compete My Workforce
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6369

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.