https://en.wikipedia.org/w/index.php?action=history&feed=atom&title=Scrypt Scrypt - Revision history 2024-11-23T01:43:36Z Revision history for this page on the wiki MediaWiki 1.44.0-wmf.4 https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1255982297&oldid=prev Drake Redcrest: /* Introduction */ Added IL for brute-force attack 2024-11-07T16:23:39Z <p><span class="autocomment">Introduction: </span> Added IL for brute-force attack</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 16:23, 7 November 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 27:</td> <td colspan="2" class="diff-lineno">Line 27:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>A password-based [[key derivation function]] (password-based KDF) is generally designed to be computationally intensive, so that it takes a relatively long time to compute (say on the order of several hundred milliseconds). Legitimate users only need to perform the function once per operation (e.g., authentication), and so the time required is negligible. However, a brute-force attack would likely need to perform the operation billions of times, at which point the time requirements become significant and, ideally, prohibitive.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>A password-based [[key derivation function]] (password-based KDF) is generally designed to be computationally intensive, so that it takes a relatively long time to compute (say on the order of several hundred milliseconds). Legitimate users only need to perform the function once per operation (e.g., authentication), and so the time required is negligible. However, a <ins style="font-weight: bold; text-decoration: none;">[[</ins>brute-force attack<ins style="font-weight: bold; text-decoration: none;">]]</ins> would likely need to perform the operation billions of times, at which point the time requirements become significant and, ideally, prohibitive.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Previous password-based KDFs (such as the popular [[PBKDF2]] from [[RSA Laboratories]]) have relatively low resource demands, meaning they do not require elaborate hardware or very much memory to perform. They are therefore easily and cheaply implemented in hardware (for instance on an [[Application-specific integrated circuit|ASIC]] or even an [[Field-programmable gate array|FPGA]]). This allows an attacker with sufficient resources to launch a large-scale parallel attack by building hundreds or even thousands of implementations of the algorithm in hardware and having each search a different subset of the key space. This divides the amount of time needed to complete a brute-force attack by the number of implementations available, very possibly bringing it down to a reasonable time frame.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Previous password-based KDFs (such as the popular [[PBKDF2]] from [[RSA Laboratories]]) have relatively low resource demands, meaning they do not require elaborate hardware or very much memory to perform. They are therefore easily and cheaply implemented in hardware (for instance on an [[Application-specific integrated circuit|ASIC]] or even an [[Field-programmable gate array|FPGA]]). This allows an attacker with sufficient resources to launch a large-scale parallel attack by building hundreds or even thousands of implementations of the algorithm in hardware and having each search a different subset of the key space. This divides the amount of time needed to complete a brute-force attack by the number of implementations available, very possibly bringing it down to a reasonable time frame.</div></td> </tr> </table> Drake Redcrest https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1225513230&oldid=prev Vanished user 88ea9d4ca7a2ed854a43ba56e408dae6: Rescuing 11 sources and tagging 0 as dead.) #IABot (v2.0.9.5 2024-05-24T22:19:17Z <p>Rescuing 11 sources and tagging 0 as dead.) #IABot (v2.0.9.5</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:19, 24 May 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 23:</td> <td colspan="2" class="diff-lineno">Line 23:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>In [[cryptography]], '''scrypt''' (pronounced "ess crypt"&lt;ref&gt;{{cite web|title=Colin Percival |website=Twitter|url=https://twitter.com/cperciva/status/734613598383841281 |archive-url=https://web.archive.org/web/20190217215034/https://twitter.com/cperciva/status/734613598383841281 |archive-date=17 February 2019 |url-status=live}}&lt;/ref&gt;) is a password-based [[key derivation function]] created by [[Colin Percival]] in March 2009, originally for the [[Tarsnap]] online backup service.&lt;ref name="tarsnap"&gt;{{cite web|title=The scrypt key derivation function |website=Tarsnap |url=http://www.tarsnap.com/scrypt.html|access-date=21 January 2014}}&lt;/ref&gt;&lt;ref name="manpages"&gt;{{cite web|title=SCRYPT(1) General Commands Manual |website=Debian Manpages |url=https://manpages.debian.org/testing/scrypt/scrypt.1.en.html |access-date=2 March 2022}}&lt;/ref&gt; The algorithm was specifically designed to make it costly to perform large-scale [[custom hardware attack]]s by requiring large amounts of memory. In 2016, the scrypt algorithm was published by [[Internet Engineering Task Force|IETF]] as RFC 7914.&lt;ref&gt;{{cite web |last1=Percival |first1=Colin |last2=Josefsson |first2=Simon |title=The scrypt Password-Based Key Derivation Function |date=August 2016 |url=https://datatracker.ietf.org/doc/html/rfc7914 |publisher=RFC Editor |access-date=13 December 2021 |ref=RFC 7914}}&lt;/ref&gt; A simplified version of scrypt is used as a [[proof-of-work]] scheme by a number of [[Cryptocurrency|cryptocurrencies]], first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and [[Litecoin]] soon after.&lt;ref&gt;{{cite web|url=https://motherboard.vice.com/en_us/article/4x3ywn/beyond-bitcoin-a-guide-to-the-most-promising-cryptocurrencies|title=Beyond Bitcoin: A Guide to the Most Promising Cryptocurrencies|author=Alec Liu|date=29 November 2013 }}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>In [[cryptography]], '''scrypt''' (pronounced "ess crypt"&lt;ref&gt;{{cite web|title=Colin Percival |website=Twitter|url=https://twitter.com/cperciva/status/734613598383841281 |archive-url=https://web.archive.org/web/20190217215034/https://twitter.com/cperciva/status/734613598383841281 |archive-date=17 February 2019 |url-status=live}}&lt;/ref&gt;) is a password-based [[key derivation function]] created by [[Colin Percival]] in March 2009, originally for the [[Tarsnap]] online backup service.&lt;ref name="tarsnap"&gt;{{cite web<ins style="font-weight: bold; text-decoration: none;"> </ins>|title=The scrypt key derivation function |website=Tarsnap |url=http://www.tarsnap.com/scrypt.html<ins style="font-weight: bold; text-decoration: none;"> </ins>|access-date=21 January 2014<ins style="font-weight: bold; text-decoration: none;"> |archive-date=28 May 2019 |archive-url=https://web.archive.org/web/20190528073159/https://www.tarsnap.com/scrypt.html |url-status=live </ins>}}&lt;/ref&gt;&lt;ref name="manpages"&gt;{{cite web<ins style="font-weight: bold; text-decoration: none;"> </ins>|title=SCRYPT(1) General Commands Manual |website=Debian Manpages |url=https://manpages.debian.org/testing/scrypt/scrypt.1.en.html |access-date=2 March 2022<ins style="font-weight: bold; text-decoration: none;"> |archive-date=2 March 2022 |archive-url=https://web.archive.org/web/20220302173629/https://manpages.debian.org/testing/scrypt/scrypt.1.en.html |url-status=live </ins>}}&lt;/ref&gt; The algorithm was specifically designed to make it costly to perform large-scale [[custom hardware attack]]s by requiring large amounts of memory. In 2016, the scrypt algorithm was published by [[Internet Engineering Task Force|IETF]] as RFC 7914.&lt;ref&gt;{{cite web |last1=Percival |first1=Colin |last2=Josefsson |first2=Simon |title=The scrypt Password-Based Key Derivation Function |date=August 2016 |url=https://datatracker.ietf.org/doc/html/rfc7914 |publisher=RFC Editor |access-date=13 December 2021 |ref=RFC 7914<ins style="font-weight: bold; text-decoration: none;"> |archive-date=13 December 2021 |archive-url=https://web.archive.org/web/20211213142419/https://datatracker.ietf.org/doc/html/rfc7914 |url-status=live </ins>}}&lt;/ref&gt; A simplified version of scrypt is used as a [[proof-of-work]] scheme by a number of [[Cryptocurrency|cryptocurrencies]], first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and [[Litecoin]] soon after.&lt;ref&gt;{{cite web|url=https://motherboard.vice.com/en_us/article/4x3ywn/beyond-bitcoin-a-guide-to-the-most-promising-cryptocurrencies|title=Beyond Bitcoin: A Guide to the Most Promising Cryptocurrencies|author=Alec Liu|date=29 November 2013<ins style="font-weight: bold; text-decoration: none;">|access-date=8</ins> <ins style="font-weight: bold; text-decoration: none;">July 2017|archive-date=13 June 2018|archive-url=https://web.archive.org/web/20180613111615/https://motherboard.vice.com/en_us/article/4x3ywn/beyond-bitcoin-a-guide-to-the-most-promising-cryptocurrencies|url-status=live</ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> </tr> <tr> <td colspan="2" class="diff-lineno">Line 31:</td> <td colspan="2" class="diff-lineno">Line 31:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Previous password-based KDFs (such as the popular [[PBKDF2]] from [[RSA Laboratories]]) have relatively low resource demands, meaning they do not require elaborate hardware or very much memory to perform. They are therefore easily and cheaply implemented in hardware (for instance on an [[Application-specific integrated circuit|ASIC]] or even an [[Field-programmable gate array|FPGA]]). This allows an attacker with sufficient resources to launch a large-scale parallel attack by building hundreds or even thousands of implementations of the algorithm in hardware and having each search a different subset of the key space. This divides the amount of time needed to complete a brute-force attack by the number of implementations available, very possibly bringing it down to a reasonable time frame.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Previous password-based KDFs (such as the popular [[PBKDF2]] from [[RSA Laboratories]]) have relatively low resource demands, meaning they do not require elaborate hardware or very much memory to perform. They are therefore easily and cheaply implemented in hardware (for instance on an [[Application-specific integrated circuit|ASIC]] or even an [[Field-programmable gate array|FPGA]]). This allows an attacker with sufficient resources to launch a large-scale parallel attack by building hundreds or even thousands of implementations of the algorithm in hardware and having each search a different subset of the key space. This divides the amount of time needed to complete a brute-force attack by the number of implementations available, very possibly bringing it down to a reasonable time frame.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The scrypt function is designed to hinder such attempts by raising the resource demands of the algorithm. Specifically, the algorithm is designed to use a large amount of memory compared to other password-based KDFs,&lt;ref&gt;{{Cite web |url=http://www.tarsnap.com/scrypt/scrypt.pdf |title=Stronger Key Derivation Via Sequential Memory-Hard Functions |access-date=2022-11-11 |last=Percival |first=Colin}}&lt;/ref&gt; making the size and the cost of a hardware implementation much more expensive, and therefore limiting the amount of parallelism an attacker can use, for a given amount of financial resources.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The scrypt function is designed to hinder such attempts by raising the resource demands of the algorithm. Specifically, the algorithm is designed to use a large amount of memory compared to other password-based KDFs,&lt;ref&gt;{{Cite web |url=http://www.tarsnap.com/scrypt/scrypt.pdf |title=Stronger Key Derivation Via Sequential Memory-Hard Functions |access-date=2022-11-11 |last=Percival |first=Colin<ins style="font-weight: bold; text-decoration: none;"> |archive-date=14 April 2019 |archive-url=https://web.archive.org/web/20190414144147/http://www.tarsnap.com/scrypt/scrypt.pdf |url-status=live </ins>}}&lt;/ref&gt; making the size and the cost of a hardware implementation much more expensive, and therefore limiting the amount of parallelism an attacker can use, for a given amount of financial resources.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Overview ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Overview ==</div></td> </tr> <tr> <td colspan="2" class="diff-lineno">Line 111:</td> <td colspan="2" class="diff-lineno">Line 111:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Cryptocurrency uses ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Cryptocurrency uses ==</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Scrypt is used in many cryptocurrencies as a [[proof-of-work]] algorithm (more precisely, as the hash function in the [[Hashcash]] proof-of-work algorithm). It was first implemented for Tenebrix (released in September 2011) and served as the basis for [[Litecoin]] and [[Dogecoin]], which also adopted its scrypt algorithm.&lt;ref&gt;{{cite book |url=https://books.google.com/books?id=IXmrBQAAQBAJ&amp;pg=PA221 |title=Mastering Bitcoin: Unlocking Digital Cryptocurrencies |pages=221, 223 |author=Andreas M. Antonopoulos |date=3 December 2014 |publisher=O'Reilly Media |isbn=9781491902646 }}&lt;/ref&gt;&lt;ref&gt;{{cite web | url=https://litecoin.info/History_of_cryptocurrency | title=History of cryptocurrency |date=7 February 2014|website=litecoin.info wiki| access-date=27 June 2014 | archive-url=https://web.archive.org/web/20160611133738/https://litecoin.info/History_of_cryptocurrency | archive-date=11 June 2016 | url-status=dead }}&lt;/ref&gt; Mining of [[cryptocurrencies]] that use scrypt is often performed on graphics processing units ([[GPUs]]) since GPUs tend to have significantly more processing power (for some algorithms) compared to the CPU.&lt;ref&gt;{{cite book|url=https://www.amazon.com/Litecoin-Scrypt-Mining-Configurations-Radeon-ebook/dp/B00E2RT1I4|title=Litecoin Scrypt Mining Configurations for Radeon 7950|author=Roman Guelfi-Gibbs|publisher=Amazon Digital Services}}&lt;/ref&gt; This led to shortages of high end GPUs due to the rising price of these currencies in the months of November and December 2013.&lt;ref&gt;{{cite web|url=http://www.extremetech.com/computing/172381-massive-surge-in-litecoin-mining-leads-to-radeon-shortage|author=Joel Hruska|title=Massive surge in Litecoin mining leads to graphics card shortage|date=10 December 2013|publisher=ExtremeTech}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Scrypt is used in many cryptocurrencies as a [[proof-of-work]] algorithm (more precisely, as the hash function in the [[Hashcash]] proof-of-work algorithm). It was first implemented for Tenebrix (released in September 2011) and served as the basis for [[Litecoin]] and [[Dogecoin]], which also adopted its scrypt algorithm.&lt;ref&gt;{{cite book |url=https://books.google.com/books?id=IXmrBQAAQBAJ&amp;pg=PA221 |title=Mastering Bitcoin: Unlocking Digital Cryptocurrencies |pages=221, 223 |author=Andreas M. Antonopoulos |date=3 December 2014 |publisher=O'Reilly Media |isbn=9781491902646 }}&lt;/ref&gt;&lt;ref&gt;{{cite web | url=https://litecoin.info/History_of_cryptocurrency | title=History of cryptocurrency |date=7 February 2014|website=litecoin.info wiki| access-date=27 June 2014 | archive-url=https://web.archive.org/web/20160611133738/https://litecoin.info/History_of_cryptocurrency | archive-date=11 June 2016 | url-status=dead }}&lt;/ref&gt; Mining of [[cryptocurrencies]] that use scrypt is often performed on graphics processing units ([[GPUs]]) since GPUs tend to have significantly more processing power (for some algorithms) compared to the CPU.&lt;ref&gt;{{cite book|url=https://www.amazon.com/Litecoin-Scrypt-Mining-Configurations-Radeon-ebook/dp/B00E2RT1I4|title=Litecoin Scrypt Mining Configurations for Radeon 7950|author=Roman Guelfi-Gibbs|publisher=Amazon Digital Services<ins style="font-weight: bold; text-decoration: none;">|access-date=11 September 2017|archive-date=24 October 2016|archive-url=https://web.archive.org/web/20161024084236/https://www.amazon.com/Litecoin-Scrypt-Mining-Configurations-Radeon-ebook/dp/B00E2RT1I4|url-status=live</ins>}}&lt;/ref&gt; This led to shortages of high end GPUs due to the rising price of these currencies in the months of November and December 2013.&lt;ref&gt;{{cite web|url=http://www.extremetech.com/computing/172381-massive-surge-in-litecoin-mining-leads-to-radeon-shortage|author=Joel Hruska|title=Massive surge in Litecoin mining leads to graphics card shortage|date=10 December 2013|publisher=ExtremeTech<ins style="font-weight: bold; text-decoration: none;">|access-date=1 January 2014|archive-date=12 December 2017|archive-url=https://web.archive.org/web/20171212093559/http://www.extremetech.com/computing/172381-massive-surge-in-litecoin-mining-leads-to-radeon-shortage|url-status=live</ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Utility ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Utility ==</div></td> </tr> <tr> <td colspan="2" class="diff-lineno">Line 132:</td> <td colspan="2" class="diff-lineno">Line 132:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Argon2]] – winner of the [[Password Hashing Competition]] in 2015</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Argon2]] – winner of the [[Password Hashing Competition]] in 2015</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[bcrypt]] – blowfish-based password-hashing function</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[bcrypt]] – blowfish-based password-hashing function</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)#Blowfish-based scheme|bcrypt]] – blowfish-based cross-platform file encryption utility developed in 2002&lt;ref&gt;{{cite web|url=http://bcrypt.sourceforge.net|title=Bcrypt – Blowfish File Encryption (homepage)|accessdate=8 April 2024|first1=Johnny|last1=Shelley|first2=Philip|last2=Stolarczyk|website=Sourceforge}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://droidinformer.org/tools/bcrypt/|title=bcrypt APK for Android – free download on Droid Informer|website=droidinformer.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://t2sde.org/packages/bcrypt.html|title=T2 package – trunk – bcrypt – A utility to encrypt files.|website=t2sde.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://docs.oracle.com/goldengate/1212/gg-winux/OGGLC/ogglc_licenses.htm|title=Oracle® GoldenGate Licensing Information|website=Oracle Help Center}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)#Blowfish-based scheme|bcrypt]] – blowfish-based cross-platform file encryption utility developed in 2002&lt;ref&gt;{{cite web|url=http://bcrypt.sourceforge.net<ins style="font-weight: bold; text-decoration: none;">/</ins>|title=Bcrypt – Blowfish File Encryption (homepage)|accessdate=8 April 2024|first1=Johnny|last1=Shelley|first2=Philip|last2=Stolarczyk|website=Sourceforge<ins style="font-weight: bold; text-decoration: none;">|archive-date=29 August 2015|archive-url=https://web.archive.org/web/20150829060804/http://bcrypt.sourceforge.net/|url-status=live</ins>}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://droidinformer.org/tools/bcrypt/|title=bcrypt APK for Android – free download on Droid Informer|website=droidinformer.org<ins style="font-weight: bold; text-decoration: none;">|access-date=2 March 2022|archive-date=15 February 2020|archive-url=https://web.archive.org/web/20200215210334/https://droidinformer.org/tools/bcrypt/|url-status=live</ins>}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://t2sde.org/packages/bcrypt.html|title=T2 package – trunk – bcrypt – A utility to encrypt files.|website=t2sde.org<ins style="font-weight: bold; text-decoration: none;">|access-date=2 March 2022|archive-date=28 October 2017|archive-url=https://web.archive.org/web/20171028043502/http://t2sde.org/packages/bcrypt.html|url-status=live</ins>}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://docs.oracle.com/goldengate/1212/gg-winux/OGGLC/ogglc_licenses.htm|title=Oracle® GoldenGate Licensing Information|website=Oracle Help Center<ins style="font-weight: bold; text-decoration: none;">|access-date=8 April 2024|archive-date=6 March 2024|archive-url=https://web.archive.org/web/20240306230633/https://docs.oracle.com/goldengate/1212/gg-winux/OGGLC/ogglc_licenses.htm|url-status=live</ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)|crypt]] – Unix C library function</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)|crypt]] – Unix C library function</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[crypt (Unix)|crypt]] – Unix utility</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[crypt (Unix)|crypt]] – Unix utility</div></td> </tr> </table> Vanished user 88ea9d4ca7a2ed854a43ba56e408dae6 https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1221485794&oldid=prev Retimuko: Undid revision 1221481777 by 2404:1C40:C1:2E97:1:0:2068:F790 (talk) 2024-04-30T06:32:13Z <p>Undid revision <a href="/wiki/Special:Diff/1221481777" title="Special:Diff/1221481777">1221481777</a> by <a href="/wiki/Special:Contributions/2404:1C40:C1:2E97:1:0:2068:F790" title="Special:Contributions/2404:1C40:C1:2E97:1:0:2068:F790">2404:1C40:C1:2E97:1:0:2068:F790</a> (<a href="/w/index.php?title=User_talk:2404:1C40:C1:2E97:1:0:2068:F790&amp;action=edit&amp;redlink=1" class="new" title="User talk:2404:1C40:C1:2E97:1:0:2068:F790 (page does not exist)">talk</a>)</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 06:32, 30 April 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 23:</td> <td colspan="2" class="diff-lineno">Line 23:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>In [[cryptography]], '''scrypt''' (pronounced "ess crypt"&lt;ref&gt;{{cite web|title=Colin Percival |website=Twitter|url=<del style="font-weight: bold; text-decoration: none;">849515859</del> |archive-url=https://web.archive.org/web/20190217215034/https://twitter.com/cperciva/status/734613598383841281 |archive-date=17 February 2019 |url-status=live}}&lt;/ref&gt;) is a password-based [[key derivation function]] created by [[Colin Percival]] in March 2009, originally for the [[Tarsnap]] online backup service.&lt;ref name="tarsnap"&gt;{{cite web|title=The scrypt key derivation function |website=Tarsnap |url=http://www.tarsnap.com/scrypt.html|access-date=21 January 2014}}&lt;/ref&gt;&lt;ref name="manpages"&gt;{{cite web|title=SCRYPT(1) General Commands Manual |website=Debian Manpages |url=https://manpages.debian.org/testing/scrypt/scrypt.1.en.html |access-date=2 March 2022}}&lt;/ref&gt; The algorithm was specifically designed to make it costly to perform large-scale [[custom hardware attack]]s by requiring large amounts of memory. In 2016, the scrypt algorithm was published by [[Internet Engineering Task Force|IETF]] as RFC 7914.&lt;ref&gt;{{cite web |last1=Percival |first1=Colin |last2=Josefsson |first2=Simon |title=The scrypt Password-Based Key Derivation Function |date=August 2016 |url=https://datatracker.ietf.org/doc/html/rfc7914 |publisher=RFC Editor |access-date=13 December 2021 |ref=RFC 7914}}&lt;/ref&gt; A simplified version of scrypt is used as a [[proof-of-work]] scheme by a number of [[Cryptocurrency|cryptocurrencies]], first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and [[Litecoin]] soon after.&lt;ref&gt;{{cite web|url=https://motherboard.vice.com/en_us/article/4x3ywn/beyond-bitcoin-a-guide-to-the-most-promising-cryptocurrencies|title=Beyond Bitcoin: A Guide to the Most Promising Cryptocurrencies|author=Alec Liu|date=29 November 2013 }}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>In [[cryptography]], '''scrypt''' (pronounced "ess crypt"&lt;ref&gt;{{cite web|title=Colin Percival |website=Twitter|url=<ins style="font-weight: bold; text-decoration: none;">https://twitter.com/cperciva/status/734613598383841281</ins> |archive-url=https://web.archive.org/web/20190217215034/https://twitter.com/cperciva/status/734613598383841281 |archive-date=17 February 2019 |url-status=live}}&lt;/ref&gt;) is a password-based [[key derivation function]] created by [[Colin Percival]] in March 2009, originally for the [[Tarsnap]] online backup service.&lt;ref name="tarsnap"&gt;{{cite web|title=The scrypt key derivation function |website=Tarsnap |url=http://www.tarsnap.com/scrypt.html|access-date=21 January 2014}}&lt;/ref&gt;&lt;ref name="manpages"&gt;{{cite web|title=SCRYPT(1) General Commands Manual |website=Debian Manpages |url=https://manpages.debian.org/testing/scrypt/scrypt.1.en.html |access-date=2 March 2022}}&lt;/ref&gt; The algorithm was specifically designed to make it costly to perform large-scale [[custom hardware attack]]s by requiring large amounts of memory. In 2016, the scrypt algorithm was published by [[Internet Engineering Task Force|IETF]] as RFC 7914.&lt;ref&gt;{{cite web |last1=Percival |first1=Colin |last2=Josefsson |first2=Simon |title=The scrypt Password-Based Key Derivation Function |date=August 2016 |url=https://datatracker.ietf.org/doc/html/rfc7914 |publisher=RFC Editor |access-date=13 December 2021 |ref=RFC 7914}}&lt;/ref&gt; A simplified version of scrypt is used as a [[proof-of-work]] scheme by a number of [[Cryptocurrency|cryptocurrencies]], first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and [[Litecoin]] soon after.&lt;ref&gt;{{cite web|url=https://motherboard.vice.com/en_us/article/4x3ywn/beyond-bitcoin-a-guide-to-the-most-promising-cryptocurrencies|title=Beyond Bitcoin: A Guide to the Most Promising Cryptocurrencies|author=Alec Liu|date=29 November 2013 }}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> </tr> </table> Retimuko https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1221481777&oldid=prev 2404:1C40:C1:2E97:1:0:2068:F790: 849515859 2024-04-30T05:48:32Z <p>849515859</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 05:48, 30 April 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 23:</td> <td colspan="2" class="diff-lineno">Line 23:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>In [[cryptography]], '''scrypt''' (pronounced "ess crypt"&lt;ref&gt;{{cite web|title=Colin Percival |website=Twitter|url=<del style="font-weight: bold; text-decoration: none;">https://twitter.com/cperciva/status/734613598383841281</del> |archive-url=https://web.archive.org/web/20190217215034/https://twitter.com/cperciva/status/734613598383841281 |archive-date=17 February 2019 |url-status=live}}&lt;/ref&gt;) is a password-based [[key derivation function]] created by [[Colin Percival]] in March 2009, originally for the [[Tarsnap]] online backup service.&lt;ref name="tarsnap"&gt;{{cite web|title=The scrypt key derivation function |website=Tarsnap |url=http://www.tarsnap.com/scrypt.html|access-date=21 January 2014}}&lt;/ref&gt;&lt;ref name="manpages"&gt;{{cite web|title=SCRYPT(1) General Commands Manual |website=Debian Manpages |url=https://manpages.debian.org/testing/scrypt/scrypt.1.en.html |access-date=2 March 2022}}&lt;/ref&gt; The algorithm was specifically designed to make it costly to perform large-scale [[custom hardware attack]]s by requiring large amounts of memory. In 2016, the scrypt algorithm was published by [[Internet Engineering Task Force|IETF]] as RFC 7914.&lt;ref&gt;{{cite web |last1=Percival |first1=Colin |last2=Josefsson |first2=Simon |title=The scrypt Password-Based Key Derivation Function |date=August 2016 |url=https://datatracker.ietf.org/doc/html/rfc7914 |publisher=RFC Editor |access-date=13 December 2021 |ref=RFC 7914}}&lt;/ref&gt; A simplified version of scrypt is used as a [[proof-of-work]] scheme by a number of [[Cryptocurrency|cryptocurrencies]], first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and [[Litecoin]] soon after.&lt;ref&gt;{{cite web|url=https://motherboard.vice.com/en_us/article/4x3ywn/beyond-bitcoin-a-guide-to-the-most-promising-cryptocurrencies|title=Beyond Bitcoin: A Guide to the Most Promising Cryptocurrencies|author=Alec Liu|date=29 November 2013 }}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>In [[cryptography]], '''scrypt''' (pronounced "ess crypt"&lt;ref&gt;{{cite web|title=Colin Percival |website=Twitter|url=<ins style="font-weight: bold; text-decoration: none;">849515859</ins> |archive-url=https://web.archive.org/web/20190217215034/https://twitter.com/cperciva/status/734613598383841281 |archive-date=17 February 2019 |url-status=live}}&lt;/ref&gt;) is a password-based [[key derivation function]] created by [[Colin Percival]] in March 2009, originally for the [[Tarsnap]] online backup service.&lt;ref name="tarsnap"&gt;{{cite web|title=The scrypt key derivation function |website=Tarsnap |url=http://www.tarsnap.com/scrypt.html|access-date=21 January 2014}}&lt;/ref&gt;&lt;ref name="manpages"&gt;{{cite web|title=SCRYPT(1) General Commands Manual |website=Debian Manpages |url=https://manpages.debian.org/testing/scrypt/scrypt.1.en.html |access-date=2 March 2022}}&lt;/ref&gt; The algorithm was specifically designed to make it costly to perform large-scale [[custom hardware attack]]s by requiring large amounts of memory. In 2016, the scrypt algorithm was published by [[Internet Engineering Task Force|IETF]] as RFC 7914.&lt;ref&gt;{{cite web |last1=Percival |first1=Colin |last2=Josefsson |first2=Simon |title=The scrypt Password-Based Key Derivation Function |date=August 2016 |url=https://datatracker.ietf.org/doc/html/rfc7914 |publisher=RFC Editor |access-date=13 December 2021 |ref=RFC 7914}}&lt;/ref&gt; A simplified version of scrypt is used as a [[proof-of-work]] scheme by a number of [[Cryptocurrency|cryptocurrencies]], first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and [[Litecoin]] soon after.&lt;ref&gt;{{cite web|url=https://motherboard.vice.com/en_us/article/4x3ywn/beyond-bitcoin-a-guide-to-the-most-promising-cryptocurrencies|title=Beyond Bitcoin: A Guide to the Most Promising Cryptocurrencies|author=Alec Liu|date=29 November 2013 }}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> </tr> </table> 2404:1C40:C1:2E97:1:0:2068:F790 https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1217923222&oldid=prev Northernhenge: /* See also */ licensing information version without Japanese text 2024-04-08T17:46:20Z <p><span class="autocomment">See also: </span> licensing information version without Japanese text</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 17:46, 8 April 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 132:</td> <td colspan="2" class="diff-lineno">Line 132:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Argon2]] – winner of the [[Password Hashing Competition]] in 2015</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Argon2]] – winner of the [[Password Hashing Competition]] in 2015</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[bcrypt]] – blowfish-based password-hashing function</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[bcrypt]] – blowfish-based password-hashing function</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)#Blowfish-based scheme|bcrypt]] – blowfish-based cross-platform file encryption utility developed in 2002&lt;ref&gt;{{cite web|url=http://bcrypt.sourceforge.net|title=Bcrypt – Blowfish File Encryption (homepage)|accessdate=8 April 2024|first1=Johnny|last1=Shelley|first2=Philip|last2=Stolarczyk|website=Sourceforge}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://droidinformer.org/tools/bcrypt/|title=bcrypt APK for Android – free download on Droid Informer|website=droidinformer.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://t2sde.org/packages/bcrypt.html|title=T2 package – trunk – bcrypt – A utility to encrypt files.|website=t2sde.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://docs.oracle.com/<del style="font-weight: bold; text-decoration: none;">cd</del>/<del style="font-weight: bold; text-decoration: none;">E51849_01</del>/gg-winux/OGGLC/ogglc_licenses.htm|title=Oracle GoldenGate<del style="font-weight: bold; text-decoration: none;">のライセンス</del>|website=<del style="font-weight: bold; text-decoration: none;">docs.oracle.com</del>}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)#Blowfish-based scheme|bcrypt]] – blowfish-based cross-platform file encryption utility developed in 2002&lt;ref&gt;{{cite web|url=http://bcrypt.sourceforge.net|title=Bcrypt – Blowfish File Encryption (homepage)|accessdate=8 April 2024|first1=Johnny|last1=Shelley|first2=Philip|last2=Stolarczyk|website=Sourceforge}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://droidinformer.org/tools/bcrypt/|title=bcrypt APK for Android – free download on Droid Informer|website=droidinformer.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://t2sde.org/packages/bcrypt.html|title=T2 package – trunk – bcrypt – A utility to encrypt files.|website=t2sde.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://docs.oracle.com/<ins style="font-weight: bold; text-decoration: none;">goldengate</ins>/<ins style="font-weight: bold; text-decoration: none;">1212</ins>/gg-winux/OGGLC/ogglc_licenses.htm|title=Oracle<ins style="font-weight: bold; text-decoration: none;">®</ins> GoldenGate<ins style="font-weight: bold; text-decoration: none;"> Licensing Information</ins>|website=<ins style="font-weight: bold; text-decoration: none;">Oracle Help Center</ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)|crypt]] – Unix C library function</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)|crypt]] – Unix C library function</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[crypt (Unix)|crypt]] – Unix utility</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[crypt (Unix)|crypt]] – Unix utility</div></td> </tr> </table> Northernhenge https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1217916686&oldid=prev Northernhenge: /* See also */ More details for ref 2024-04-08T16:56:38Z <p><span class="autocomment">See also: </span> More details for ref</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 16:56, 8 April 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 132:</td> <td colspan="2" class="diff-lineno">Line 132:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Argon2]] – winner of the [[Password Hashing Competition]] in 2015</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Argon2]] – winner of the [[Password Hashing Competition]] in 2015</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[bcrypt]] – blowfish-based password-hashing function</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[bcrypt]] – blowfish-based password-hashing function</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)#Blowfish-based scheme|bcrypt]] – blowfish-based cross-platform file encryption utility developed in 2002&lt;ref&gt;http://bcrypt.sourceforge.net <del style="font-weight: bold; text-decoration: none;">bcrypt</del> <del style="font-weight: bold; text-decoration: none;">file</del> <del style="font-weight: bold; text-decoration: none;">encryption</del> <del style="font-weight: bold; text-decoration: none;">program</del> homepage&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://droidinformer.org/tools/bcrypt/|title=bcrypt APK for Android – free download on Droid Informer|website=droidinformer.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://t2sde.org/packages/bcrypt.html|title=T2 package – trunk – bcrypt – A utility to encrypt files.|website=t2sde.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://docs.oracle.com/cd/E51849_01/gg-winux/OGGLC/ogglc_licenses.htm|title=Oracle GoldenGateのライセンス|website=docs.oracle.com}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)#Blowfish-based scheme|bcrypt]] – blowfish-based cross-platform file encryption utility developed in 2002&lt;ref&gt;<ins style="font-weight: bold; text-decoration: none;">{{cite web|url=</ins>http://bcrypt.sourceforge.net<ins style="font-weight: bold; text-decoration: none;">|title=Bcrypt</ins> <ins style="font-weight: bold; text-decoration: none;">–</ins> <ins style="font-weight: bold; text-decoration: none;">Blowfish</ins> <ins style="font-weight: bold; text-decoration: none;">File</ins> <ins style="font-weight: bold; text-decoration: none;">Encryption</ins> <ins style="font-weight: bold; text-decoration: none;">(</ins>homepage<ins style="font-weight: bold; text-decoration: none;">)|accessdate=8 April 2024|first1=Johnny|last1=Shelley|first2=Philip|last2=Stolarczyk|website=Sourceforge}}</ins>&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://droidinformer.org/tools/bcrypt/|title=bcrypt APK for Android – free download on Droid Informer|website=droidinformer.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://t2sde.org/packages/bcrypt.html|title=T2 package – trunk – bcrypt – A utility to encrypt files.|website=t2sde.org}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://docs.oracle.com/cd/E51849_01/gg-winux/OGGLC/ogglc_licenses.htm|title=Oracle GoldenGateのライセンス|website=docs.oracle.com}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)|crypt]] – Unix C library function</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[Crypt (C)|crypt]] – Unix C library function</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[crypt (Unix)|crypt]] – Unix utility</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [[crypt (Unix)|crypt]] – Unix utility</div></td> </tr> </table> Northernhenge https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1217915254&oldid=prev Northernhenge: /* Cryptocurrency uses */ 1. More details for ref. 2. Rm unsourced paragraph 2024-04-08T16:47:01Z <p><span class="autocomment">Cryptocurrency uses: </span> 1. More details for ref. 2. Rm unsourced paragraph</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 16:47, 8 April 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 111:</td> <td colspan="2" class="diff-lineno">Line 111:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Cryptocurrency uses ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Cryptocurrency uses ==</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Scrypt is used in many cryptocurrencies as a [[proof-of-work]] algorithm (more precisely, as the hash function in the [[Hashcash]] proof-of-work algorithm). It was first implemented for Tenebrix (released in September 2011) and served as the basis for [[Litecoin]] and [[Dogecoin]], which also adopted its scrypt algorithm.&lt;ref&gt;{{cite book |url=https://books.google.com/books?id=IXmrBQAAQBAJ&amp;pg=PA221 |title=Mastering Bitcoin: Unlocking Digital Cryptocurrencies |pages=221, 223 |author=Andreas M. Antonopoulos |date=3 December 2014 |publisher=O'Reilly Media |isbn=9781491902646 }}&lt;/ref&gt;&lt;ref&gt;{{cite web | url=https://litecoin.info/History_of_cryptocurrency | title=History of cryptocurrency | access-date=27 June 2014 | archive-url=https://web.archive.org/web/20160611133738/https://litecoin.info/History_of_cryptocurrency | archive-date=11 June 2016 | url-status=dead }}&lt;/ref&gt; Mining of [[cryptocurrencies]] that use scrypt is often performed on graphics processing units ([[GPUs]]) since GPUs tend to have significantly more processing power (for some algorithms) compared to the CPU.&lt;ref&gt;{{cite book|url=https://www.amazon.com/Litecoin-Scrypt-Mining-Configurations-Radeon-ebook/dp/B00E2RT1I4|title=Litecoin Scrypt Mining Configurations for Radeon 7950|author=Roman Guelfi-Gibbs|publisher=Amazon Digital Services}}&lt;/ref&gt; This led to shortages of high end GPUs due to the rising price of these currencies in the months of November and December 2013.&lt;ref&gt;{{cite web|url=http://www.extremetech.com/computing/172381-massive-surge-in-litecoin-mining-leads-to-radeon-shortage|author=Joel Hruska|title=Massive surge in Litecoin mining leads to graphics card shortage|date=10 December 2013|publisher=ExtremeTech}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Scrypt is used in many cryptocurrencies as a [[proof-of-work]] algorithm (more precisely, as the hash function in the [[Hashcash]] proof-of-work algorithm). It was first implemented for Tenebrix (released in September 2011) and served as the basis for [[Litecoin]] and [[Dogecoin]], which also adopted its scrypt algorithm.&lt;ref&gt;{{cite book |url=https://books.google.com/books?id=IXmrBQAAQBAJ&amp;pg=PA221 |title=Mastering Bitcoin: Unlocking Digital Cryptocurrencies |pages=221, 223 |author=Andreas M. Antonopoulos |date=3 December 2014 |publisher=O'Reilly Media |isbn=9781491902646 }}&lt;/ref&gt;&lt;ref&gt;{{cite web | url=https://litecoin.info/History_of_cryptocurrency | title=History of cryptocurrency <ins style="font-weight: bold; text-decoration: none;">|date=7 February 2014|website=litecoin.info wiki</ins>| access-date=27 June 2014 | archive-url=https://web.archive.org/web/20160611133738/https://litecoin.info/History_of_cryptocurrency | archive-date=11 June 2016 | url-status=dead }}&lt;/ref&gt; Mining of [[cryptocurrencies]] that use scrypt is often performed on graphics processing units ([[GPUs]]) since GPUs tend to have significantly more processing power (for some algorithms) compared to the CPU.&lt;ref&gt;{{cite book|url=https://www.amazon.com/Litecoin-Scrypt-Mining-Configurations-Radeon-ebook/dp/B00E2RT1I4|title=Litecoin Scrypt Mining Configurations for Radeon 7950|author=Roman Guelfi-Gibbs|publisher=Amazon Digital Services}}&lt;/ref&gt; This led to shortages of high end GPUs due to the rising price of these currencies in the months of November and December 2013.&lt;ref&gt;{{cite web|url=http://www.extremetech.com/computing/172381-massive-surge-in-litecoin-mining-leads-to-radeon-shortage|author=Joel Hruska|title=Massive surge in Litecoin mining leads to graphics card shortage|date=10 December 2013|publisher=ExtremeTech}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><br /></td> <td colspan="2" class="diff-empty diff-side-added"></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>As of May 2014, specialized [[Application-specific integrated circuit|ASIC]] mining hardware is available for scrypt-based cryptocurrencies.{{cn|date=May 2019}}</div></td> <td colspan="2" class="diff-empty diff-side-added"></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Utility ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Utility ==</div></td> </tr> </table> Northernhenge https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1211092160&oldid=prev MichielN: /* Utility */ 2024-02-29T20:32:12Z <p><span class="autocomment">Utility</span></p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 20:32, 29 February 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 119:</td> <td colspan="2" class="diff-lineno">Line 119:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| name = scrypt encryption utility</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| name = scrypt encryption utility</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| developer = Colin Percival</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| developer = Colin Percival</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| latest release version = {{wikidata|property|preferred|references|edit|Q114883606|P348|P548=Q2804309}} | latest release date = {{Start date and age|{{wikidata|qualifier|preferred|single|Q114883606|P348|P548=Q2804309|P577}}|df=yes}}</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>| ver layout = </div></td> <td colspan="2" class="diff-empty diff-side-added"></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>| latest release version = {{wikidata|property|preferred|references|edit|Q114883606|P348|P400=Q94|P548=Q2804309}}</div></td> <td colspan="2" class="diff-empty diff-side-added"></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>| latest release date ={{wikidata|qualifier|preferred|single|Q114883606|P348|P400=Q94|P548=Q2804309|P577}}</div></td> <td colspan="2" class="diff-empty diff-side-added"></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| latest preview version = </div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| latest preview version = </div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| repo = {{URL|https://github.com/Tarsnap/scrypt}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| repo = {{URL|https://github.com/Tarsnap/scrypt}}</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>| engine = </div></td> <td colspan="2" class="diff-empty diff-side-added"></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| operating system = </div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| operating system = </div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| size = </div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| size = </div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| language = </div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| language = </div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>| genre = </div></td> <td colspan="2" class="diff-empty diff-side-added"></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| license = </div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| license = </div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| website = {{URL|https://www.tarsnap.com/scrypt.html}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| website = {{URL|https://www.tarsnap.com/scrypt.html}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The scrypt utility was written in May 2009 by Colin Percival as a demonstration of the scrypt key derivation function.&lt;ref name="tarsnap"/&gt;&lt;ref name="manpages"/&gt; It's available in most [[Linux]] and [[BSD]] distributions.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The scrypt utility was written in May 2009 by Colin Percival as a demonstration of the scrypt key derivation function.&lt;ref name="tarsnap"/&gt;&lt;ref name="manpages"/&gt; It's available in most [[Linux]] and [[BSD]] distributions.</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><br /></td> <td colspan="2" class="diff-empty diff-side-added"></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><br /></td> <td colspan="2" class="diff-empty diff-side-added"></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==See also==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==See also==</div></td> </tr> <!-- diff cache key enwiki:diff:1.41:old-1211091184:rev-1211092160:wikidiff2=table:1.14.1:ff290eae --> </table> MichielN https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1211091184&oldid=prev MichielN: Attempt at an extra infobox for the utility 2024-02-29T20:25:46Z <p>Attempt at an extra infobox for the utility</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 20:25, 29 February 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 116:</td> <td colspan="2" class="diff-lineno">Line 116:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Utility ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Utility ==</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>{{Infobox software</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| name = scrypt encryption utility</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| developer = Colin Percival</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| ver layout = </div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| latest release version = {{wikidata|property|preferred|references|edit|Q114883606|P348|P400=Q94|P548=Q2804309}}</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| latest release date ={{wikidata|qualifier|preferred|single|Q114883606|P348|P400=Q94|P548=Q2804309|P577}}</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| latest preview version = </div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| repo = {{URL|https://github.com/Tarsnap/scrypt}}</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| engine = </div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| operating system = </div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| size = </div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| language = </div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| genre = </div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| license = </div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| website = {{URL|https://www.tarsnap.com/scrypt.html}}</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The scrypt utility was written in May 2009 by Colin Percival as a demonstration of the scrypt key derivation function.&lt;ref name="tarsnap"/&gt;&lt;ref name="manpages"/&gt; It's available in most [[Linux]] and [[BSD]] distributions.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The scrypt utility was written in May 2009 by Colin Percival as a demonstration of the scrypt key derivation function.&lt;ref name="tarsnap"/&gt;&lt;ref name="manpages"/&gt; It's available in most [[Linux]] and [[BSD]] distributions.</div></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==See also==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==See also==</div></td> </tr> </table> MichielN https://en.wikipedia.org/w/index.php?title=Scrypt&diff=1182466821&oldid=prev Citation bot: Add: date. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | #UCB_webform 62/895 2023-10-29T14:36:50Z <p>Add: date. | <a href="/wiki/Wikipedia:UCB" class="mw-redirect" title="Wikipedia:UCB">Use this bot</a>. <a href="/wiki/Wikipedia:DBUG" class="mw-redirect" title="Wikipedia:DBUG">Report bugs</a>. | Suggested by Whoop whoop pull up | #UCB_webform 62/895</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 14:36, 29 October 2023</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 23:</td> <td colspan="2" class="diff-lineno">Line 23:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>In [[cryptography]], '''scrypt''' (pronounced "ess crypt"&lt;ref&gt;{{cite web|title=Colin Percival |website=Twitter|url=https://twitter.com/cperciva/status/734613598383841281 |archive-url=https://web.archive.org/web/20190217215034/https://twitter.com/cperciva/status/734613598383841281 |archive-date=17 February 2019 |url-status=live}}&lt;/ref&gt;) is a password-based [[key derivation function]] created by [[Colin Percival]] in March 2009, originally for the [[Tarsnap]] online backup service.&lt;ref name="tarsnap"&gt;{{cite web|title=The scrypt key derivation function |website=Tarsnap |url=http://www.tarsnap.com/scrypt.html|access-date=21 January 2014}}&lt;/ref&gt;&lt;ref name="manpages"&gt;{{cite web|title=SCRYPT(1) General Commands Manual |website=Debian Manpages |url=https://manpages.debian.org/testing/scrypt/scrypt.1.en.html |access-date=2 March 2022}}&lt;/ref&gt; The algorithm was specifically designed to make it costly to perform large-scale [[custom hardware attack]]s by requiring large amounts of memory. In 2016, the scrypt algorithm was published by [[Internet Engineering Task Force|IETF]] as RFC 7914.&lt;ref&gt;{{cite web |last1=Percival |first1=Colin |last2=Josefsson |first2=Simon |title=The scrypt Password-Based Key Derivation Function |url=https://datatracker.ietf.org/doc/html/rfc7914 |publisher=RFC Editor |access-date=13 December 2021 |ref=RFC 7914}}&lt;/ref&gt; A simplified version of scrypt is used as a [[proof-of-work]] scheme by a number of [[Cryptocurrency|cryptocurrencies]], first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and [[Litecoin]] soon after.&lt;ref&gt;{{cite web|url=https://motherboard.vice.com/en_us/article/4x3ywn/beyond-bitcoin-a-guide-to-the-most-promising-cryptocurrencies|title=Beyond Bitcoin: A Guide to the Most Promising Cryptocurrencies|author=Alec Liu}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>In [[cryptography]], '''scrypt''' (pronounced "ess crypt"&lt;ref&gt;{{cite web|title=Colin Percival |website=Twitter|url=https://twitter.com/cperciva/status/734613598383841281 |archive-url=https://web.archive.org/web/20190217215034/https://twitter.com/cperciva/status/734613598383841281 |archive-date=17 February 2019 |url-status=live}}&lt;/ref&gt;) is a password-based [[key derivation function]] created by [[Colin Percival]] in March 2009, originally for the [[Tarsnap]] online backup service.&lt;ref name="tarsnap"&gt;{{cite web|title=The scrypt key derivation function |website=Tarsnap |url=http://www.tarsnap.com/scrypt.html|access-date=21 January 2014}}&lt;/ref&gt;&lt;ref name="manpages"&gt;{{cite web|title=SCRYPT(1) General Commands Manual |website=Debian Manpages |url=https://manpages.debian.org/testing/scrypt/scrypt.1.en.html |access-date=2 March 2022}}&lt;/ref&gt; The algorithm was specifically designed to make it costly to perform large-scale [[custom hardware attack]]s by requiring large amounts of memory. In 2016, the scrypt algorithm was published by [[Internet Engineering Task Force|IETF]] as RFC 7914.&lt;ref&gt;{{cite web |last1=Percival |first1=Colin |last2=Josefsson |first2=Simon |title=The scrypt Password-Based Key Derivation Function<ins style="font-weight: bold; text-decoration: none;"> |date=August 2016</ins> |url=https://datatracker.ietf.org/doc/html/rfc7914 |publisher=RFC Editor |access-date=13 December 2021 |ref=RFC 7914}}&lt;/ref&gt; A simplified version of scrypt is used as a [[proof-of-work]] scheme by a number of [[Cryptocurrency|cryptocurrencies]], first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and [[Litecoin]] soon after.&lt;ref&gt;{{cite web|url=https://motherboard.vice.com/en_us/article/4x3ywn/beyond-bitcoin-a-guide-to-the-most-promising-cryptocurrencies|title=Beyond Bitcoin: A Guide to the Most Promising Cryptocurrencies|author=Alec Liu<ins style="font-weight: bold; text-decoration: none;">|date=29 November 2013 </ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Introduction ==</div></td> </tr> </table> Citation bot