The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.

Colin Percival 5848861673 Merge pull request #101 from Tarsnap/building-notes-fix vor 8 Jahren
lib 1cdfc7edd8 Work around OS X sysconf(_SC_PHYS_PAGES) glitch vor 8 Jahren
libcperciva 0a25a7cedd Fix humansize_parse("") vor 8 Jahren
release-tools 57fa9ac323 Add a BUILDING file, mainly for OpenSSL on OSX vor 8 Jahren
tests 8f99abd45c Merge pull request #87 from Tarsnap/tests-valgrind-file-not-found vor 8 Jahren
.autom4te.cfg 2e589805a2 autom4te.cache is stupid. vor 9 Jahren
.gitignore dfcd7a5142 git ignore: /build/ for out-of-tree builds vor 8 Jahren
.travis.yml d01d924c9d Travis-CI: use strict compile warnings/errors vor 8 Jahren
BUILDING 209a1afe46 doc: replace LDADD -> LDFLAGS in OSX instructions vor 8 Jahren
COPYRIGHT 841845a069 Move COPYRIGHT file from libcperciva/ to top level vor 8 Jahren
FORMAT c40745aa1f Update to my latest tree. vor 12 Jahren
Makefile.am c1a9826ea9 Merge pull request #89 from Tarsnap/tests-makefile-am vor 8 Jahren
README.md 57fa9ac323 Add a BUILDING file, mainly for OpenSSL on OSX vor 8 Jahren
configure.ac 01e9d7eb5f build: get version number from a script vor 8 Jahren
get-version.sh 01e9d7eb5f build: get version number from a script vor 8 Jahren
main.c ab2d5cd80c Merge pull request #74 from Tarsnap/force-resources vor 8 Jahren
scrypt.1 83cda8b234 Add -f option to force decryption vor 8 Jahren
scrypt_platform.h 9ce716b816 Source tree from which scrypt-1.0 release was built. vor 12 Jahren

README.md

The scrypt key derivation function

The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.

We estimate that on modern (2009) hardware, if 5 seconds are spent computing a derived key, the cost of a hardware brute-force attack against scrypt is roughly 4000 times greater than the cost of a similar attack against bcrypt (to find the same password), and 20000 times greater than a similar attack against PBKDF2.

Details of the scrypt key derivation function are given in a paper which was presented at the BSDCan'09 conference:

More details are given in the Internet Engineering Task Force (IETF) RFC 7914: The scrypt Password-Based Key Derivation Function.

It has been demonstrated that scrypt is maximally memory-hard:

The scrypt encryption utility

A simple password-based encryption utility is available as a demonstration of the scrypt key derivation function. On modern hardware and with default parameters, the cost of cracking the password on a file encrypted by scrypt enc is approximately 100 billion times more than the cost of cracking the same password on a file encrypted by openssl enc; this means that a five-character password using scrypt is stronger than a ten-character password using openssl.

The scrypt utility can be invoked as scrypt enc infile [outfile] to encrypt data (if outfile is not specified, the encrypted data is written to the standard output), or as scrypt dec infile [outfile] to decrypt data (if outfile is not specified, the decrypted data is written to the standard output). scrypt also supports three command-line options:

  • -t maxtime will instruct scrypt to spend at most maxtime seconds computing the derived encryption key from the password; for encryption, this value will determine how secure the encrypted data is, while for decryption this value is used as an upper limit (if scrypt detects that it would take too long to decrypt the data, it will exit with an error message).
  • -m maxmemfrac instructs scrypt to use at most the specified fraction of the available RAM for computing the derived encryption key. For encryption, increasing this value might increase the security of the encrypted data, depending on the maxtime value; for decryption, this value is used as an upper limit and may cause scrypt to exit with an error.
  • -M maxmem instructs scrypt to use at most the specified number of bytes of RAM when computing the derived encryption key.

If the encrypted data is corrupt, scrypt dec will exit with a non-zero status. However, scrypt dec may produce output before it determines that the encrypted data was corrupt, so for applications which require data to be authenticated, you must store the output of scrypt dec in a temporary location and check scrypt's exit code before using the decrypted data.

The scrypt utility has been tested on FreeBSD, NetBSD, OpenBSD, Linux (Slackware, CentOS, Gentoo, Ubuntu), Solaris, OS X, Cygwin, and GNU Hurd. To build scrypt, extract the tarball and run ./configure && make.

In addition, scrypt is available in the OpenBSD and FreeBSD ports trees and in NetBSD pkgsrc as security/scrypt.

Using scrypt as a KDF

To use scrypt as a key derivation function (KDF), take a look at the lib/crypto/crypto_scrypt.h header, which provides:

/**
 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
 * p, buflen) and write the result into buf.  The parameters r, p, and buflen
 * must satisfy r * p < 2^30 and buflen <= (2^32 - 1) * 32.  The parameter N
 * must be a power of 2 greater than 1.
 *
 * Return 0 on success; or -1 on error.
 */
int crypto_scrypt(const uint8_t *, size_t, const uint8_t *, size_t, uint64_t,
    uint32_t, uint32_t, uint8_t *, size_t);

Building

:exclamation: We strongly recommend that people use the latest official release tarball on https://www.tarsnap.com/scrypt.html

See the BUILDING file for more details (e.g., dealing with OpenSSL on OSX).

Testing

A small test suite can be run with:

make test

Memory-testing normal operations with valgrind (takes approximately 4 times as long as no valgrind tests) can be enabled with:

make test USE_VALGRIND=1

Memory-testing all tests with valgrind (requires over 1 GB memory, and takes approximately 4 times as long as USE_VALGRIND=1) can be enabled with:

make test USE_VALGRIND=2

Mailing list

The scrypt key derivation function and the scrypt encryption utility are discussed on the scrypt@tarsnap.com mailing list.