Scrypt: Harnessing Memory (2024)

By Indigo in Mining

Scrypt is a memory-hard function designed to protect against denial-of-service attacks and for metering clients' access. It is resistant to specialized hardware like ASICs and FPGAs, making it more secure than other algorithms.

Scrypt: Harnessing Memory (1)

Scrypt is a memory-hard function (MHF) innovated by Colin Percival. Often found in applications like password hashing, key derivation, and proofs-of-work, Scrypt requires a substantial amount of memory for computation, thus deterring many parallel evaluations at once. Originally, Scrypt was designed to hinder the efficiency of specialized hardware, reducing the evaluation cost disparity between ordinary users and potential attackers. This unique property makes it an effective safeguard for proofs-of-work in the digital currency arena.

The Memory-Hard Advantage of Scrypt

Scrypt is designed to be resistant to specialized hardware, such as Application-Specific Integrated Circuits (ASICs) or Field-Programmable Gate Arrays (FPGAs). The evaluation of Scrypt requires significant memory, a resource that is general-purpose and thus comparably priced across platforms. As a result, it is challenging to develop a dedicated device for a swift evaluation of the function since the memory required is consistent across different platforms. In simpler terms, Scrypt is hard to evaluate quickly due to the extensive memory requirement and its uniform cost across platforms.

SHA256 ASICs and Scrypt: A Mismatch

While Scrypt was designed to be resistant to hardware like ASICs, it's important to clarify that this resistance is not absolute. As of the mid-2010s, specialized ASIC miners for Scrypt have been developed. While Scrypt can resist these technologies to some degree, ASICs and similar specialized hardware can still operate on Scrypt to a limited extent. This property of Scrypt makes it a preferred choice for certain cryptocurrency mining as it discourages centralization of power.

The Security Payoff of Scrypt

Scrypt's primary security advantage stems from its memory-hard nature, increasing its resilience against specialized hardware attacks such as those from ASICs and FPGAs. Although not entirely impervious to such hardware, the large memory requirement makes Scrypt less susceptible to brute-force attacks that aim to compute many password possibilities. Additionally, Scrypt is designed for speed, making it ideal for interactive applications, like website logins, without causing significant user delay.

Resources

I never truly understood what the scrypt parameters 𝑁, 𝑟 and 𝑝 meant. So I read the paper and wrote it up for you. https://t.co/BL2a0BWAWH

— Filippo Valsorda (@FiloSottile) October 4, 2017

GitHub - Tarsnap/scrypt: The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.

The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative f...

Scrypt: Harnessing Memory (2)GitHubTarsnap

Scrypt: Harnessing Memory (3)

Scrypt is Maximally Memory-Hard

Scrypt: Harnessing Memory (4)

Scrypt: Harnessing Memory (5)

scrypt - Wikipedia

Scrypt: Harnessing Memory (6)Wikimedia Foundation, Inc.Contributors to Wikimedia projects

Scrypt: Harnessing Memory (7)

Scrypt: Harnessing Memory (2024)
Top Articles
What Is the Average Index Fund Return? | The Motley Fool
3 Cryptocurrencies to Buy Hand Over Fist in March | The Motley Fool
Spectrum Gdvr-2007
Patreon, reimagined — a better future for creators and fans
Inducement Small Bribe
Access-A-Ride – ACCESS NYC
How To Do A Springboard Attack In Wwe 2K22
Identifont Upload
Toyota Campers For Sale Craigslist
Comforting Nectar Bee Swarm
Lost Ark Thar Rapport Unlock
Zitobox 5000 Free Coins 2023
Acts 16 Nkjv
Is Csl Plasma Open On 4Th Of July
Flat Twist Near Me
Apnetv.con
Violent Night Showtimes Near Amc Fashion Valley 18
Mndot Road Closures
Jesus Revolution Showtimes Near Chisholm Trail 8
Strange World Showtimes Near Amc Braintree 10
Clairememory Scam
Select Truck Greensboro
Mlb Ballpark Pal
Miss America Voy Forum
Best Fare Finder Avanti
Uky Linkblue Login
Costco Gas Foster City
Divina Rapsing
Craigslist Southern Oregon Coast
Puretalkusa.com/Amac
Xfinity Outage Map Fredericksburg Va
Aliciabibs
Nottingham Forest News Now
Maths Open Ref
Mawal Gameroom Download
Lawrence Ks Police Scanner
Ucm Black Board
Quality Tire Denver City Texas
In Branch Chase Atm Near Me
The Wichita Beacon from Wichita, Kansas
Watchdocumentaries Gun Mayhem 2
Pensacola Cars Craigslist
Craigslist Tulsa Ok Farm And Garden
Www.craigslist.com Waco
If You're Getting Your Nails Done, You Absolutely Need to Tip—Here's How Much
Emily Browning Fansite
Wilson Tire And Auto Service Gambrills Photos
Sherwin Source Intranet
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
786 Area Code -Get a Local Phone Number For Miami, Florida
Leslie's Pool Supply Redding California
Latest Posts
Article information

Author: Laurine Ryan

Last Updated:

Views: 6249

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Laurine Ryan

Birthday: 1994-12-23

Address: Suite 751 871 Lissette Throughway, West Kittie, NH 41603

Phone: +2366831109631

Job: Sales Producer

Hobby: Creative writing, Motor sports, Do it yourself, Skateboarding, Coffee roasting, Calligraphy, Stand-up comedy

Introduction: My name is Laurine Ryan, I am a adorable, fair, graceful, spotless, gorgeous, homely, cooperative person who loves writing and wants to share my knowledge and understanding with you.