The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.
Graham Percival 6cec2c2d2c actions: update to latest provided versions | 4 months ago | |
---|---|---|
.github | 4 months ago | |
lib | 4 months ago | |
lib-platform | 1 year ago | |
libcperciva | 6 months ago | |
libscrypt-kdf | 1 year ago | |
m4 | 11 months ago | |
release-tools | 1 year ago | |
tests | 9 months ago | |
.autom4te.cfg | 9 years ago | |
.gitignore | 7 months ago | |
BUILDING | 10 months ago | |
COPYRIGHT | 1 year ago | |
FORMAT | 12 years ago | |
Makefile.am | 6 months ago | |
README.md | 10 months ago | |
STYLE | 9 months ago | |
configure.ac | 11 months ago | |
get-version.sh | 1 year ago | |
main.c | 6 months ago | |
scrypt.1 | 1 year ago |
The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.
We estimate that on modern (2009) hardware, if 5 seconds are spent computing a
derived key, the cost of a hardware brute-force attack against scrypt
is
roughly 4000 times greater than the cost of a similar attack against bcrypt (to
find the same password), and 20000 times greater than a similar attack against
PBKDF2. If the scrypt
encryption utility is used with default parameters,
the cost of cracking the password on a file encrypted by scrypt enc
is
approximately 100 billion times more than the cost of cracking the same
password on a file encrypted by openssl enc
; this means that a five-character
password using scrypt
is stronger than a ten-character password using
openssl
.
Details of the scrypt
key derivation function are given in:
Some additional articles may be of interest:
A simple password-based encryption utility is available as a demonstration of
the scrypt
key derivation function. It can be invoked as:
scrypt enc [options] infile [outfile]
to encrypt data,scrypt dec [options] infile [outfile]
to decrypt data, orscrypt info infile
to see the encryption parameters used, and the memory
required to decrypt the encrypted file.If [outfile]
is not specified, the output is written to standard output.
scrypt
also supports a number of command-line [options]
:
-t maxtime
will instruct scrypt
to spend at most maxtime seconds
computing the derived encryption key from the password; for encryption, this
value will determine how secure the encrypted data is, while for decryption
this value is used as an upper limit (if scrypt
detects that it would take
too long to decrypt the data, it will exit with an error message).-m maxmemfrac
instructs scrypt
to use at most the specified fraction of
the available RAM for computing the derived encryption key. For encryption,
increasing this value might increase the security of the encrypted data,
depending on the maxtime
value; for decryption, this value is used as an
upper limit and may cause
scrypt to exit with an error.-M maxmem
instructs scrypt
to use at most the specified number of bytes
of RAM when computing the derived encryption key.--logN value1
, -r value2
, -p value3
will set the encryption parameters
explicitly.--passphrase method:arg
allows the user to specify whether to read the
passphrase from stdin, /dev/tty, an environment variable, or a file.If the encrypted data is corrupt, scrypt dec
will exit with a non-zero
status. However, scrypt dec
may produce output before it determines that
the encrypted data was corrupt, so for applications which require data to be
authenticated, you must store the output of scrypt dec
in a temporary
location and check scrypt
's exit code before using the decrypted data.
To use scrypt as a key derivation function (KDF) with
libscrypt-kdf
, include scrypt-kdf.h
and use:
/**
* scrypt_kdf(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
* Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
* p, buflen) and write the result into buf. The parameters r, p, and buflen
* must satisfy r * p < 2^30 and buflen <= (2^32 - 1) * 32. The parameter N
* must be a power of 2 greater than 1.
*
* Return 0 on success; or -1 on error.
*/
int scrypt_kdf(const uint8_t *, size_t, const uint8_t *, size_t, uint64_t,
uint32_t, uint32_t, uint8_t *, size_t);
There is a sample of using this function in tests/libscrypt-kdf
.
If you installed the library, you can compile that file and run
the binary:
$ cd tests/libscrypt-kdf/
$ c99 sample-libscrypt-kdf.c -lscrypt-kdf
$ ./a.out
crypto_scrypt(): success
If you would rather copy our source files directly into your
project, then take a look at the lib/crypto/crypto_scrypt.h
header, which provides crypto_scrypt()
.
The scrypt
utility has been tested on FreeBSD, NetBSD, OpenBSD, Linux
(Slackware, CentOS, Gentoo, Ubuntu), Solaris, OS X, Cygwin, and GNU Hurd.
This cleartext signature of the SHA256 output can be verified with:
gpg --decrypt scrypt-sigs-1.3.2.asc
You may then compare the displayed hash to the SHA256 hash of
scrypt-1.3.2.tgz
.
In addition, scrypt
is available in the OpenBSD and FreeBSD ports trees and
in NetBSD pkgsrc as security/scrypt
.
:exclamation: We strongly recommend that people use the latest official release tarball on https://www.tarsnap.com/scrypt.html
To build scrypt, extract the tarball and run ./configure
&& make
. See the
BUILDING file for more details (e.g., dealing with OpenSSL on OSX).
A small test suite can be run with:
make test
On platforms with less than 1 GB of RAM, use:
make test SMALLMEM=1
Memory-testing normal operations with valgrind (takes approximately 4 times as long as no valgrind tests) can be enabled with:
make test USE_VALGRIND=1
Memory-testing all tests with valgrind (requires over 1 GB memory, and takes
approximately 4 times as long as USE_VALGRIND=1
) can be enabled with:
make test USE_VALGRIND=2
The scrypt key derivation function and the scrypt encryption utility are discussed on the scrypt@tarsnap.com mailing list.