Scrypt

In cryptography, scrypt (pronounced "ess crypt" ) is a password-based key derivation function created by Colin Percival, originally for the Tarsnap online backup service.wikipedia
43 Related Articles

Litecoin

LTC
A simplified version of scrypt is used as a proof-of-work scheme by a number of cryptocurrencies, first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and Litecoin soon after. It was first implemented for Tenebrix (released in September 2011) and served as the basis for Litecoin and Dogecoin, which also adopted its scrypt algorithm.
It was a fork of the Bitcoin Core client, differing primarily by having a decreased block generation time (2.5 minutes), increased maximum number of coins, different hashing algorithm (scrypt, instead of SHA-256), and a slightly modified GUI.

Key derivation function

password hashderive another keyhashes
In cryptography, scrypt (pronounced "ess crypt" ) is a password-based key derivation function created by Colin Percival, originally for the Tarsnap online backup service.
Various algorithms have been designed specifically for this purpose, including bcrypt, scrypt and, more recently, Argon2 (the winner of the Password Hashing Competition).

Cryptocurrency

cryptocurrenciescrypto-currencyaltcoin
A simplified version of scrypt is used as a proof-of-work scheme by a number of cryptocurrencies, first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and Litecoin soon after. Mining of cryptocurrencies that use scrypt is often performed on graphics processing units (GPUs) since GPUs tend to have significantly more processing power (for some algorithms) compared to the CPU.
It was the first successful cryptocurrency to use scrypt as its hash function instead of SHA-256.

Dogecoin

DOGE
It was first implemented for Tenebrix (released in September 2011) and served as the basis for Litecoin and Dogecoin, which also adopted its scrypt algorithm.
In turn, Luckycoin is based on Litecoin, which also uses scrypt technology in its proof-of-work algorithm.

PBKDF2

Previous password-based KDFs (such as the popular PBKDF2 from RSA Laboratories) have relatively low resource demands, meaning they do not require elaborate hardware or very much memory to perform.
fixed for a given amount of CPU time) and is slightly stronger against such attacks, while the more modern scrypt key derivation function can use arbitrarily large amounts of memory and is therefore more resistant to ASIC and GPU attacks.

Bcrypt

bcrypt, password hashing function using Blowfish
scrypt

Cryptography

cryptographiccryptographercryptology
In cryptography, scrypt (pronounced "ess crypt" ) is a password-based key derivation function created by Colin Percival, originally for the Tarsnap online backup service.

Custom hardware attack

COPACOBANAhardware implementations
The algorithm was specifically designed to make it costly to perform large-scale custom hardware attacks by requiring large amounts of memory.

Internet Engineering Task Force

IETFInternet Engineering Task Force (IETF)working group
In 2016, the scrypt algorithm was published by IETF as RFC 7914.

Proof-of-work system

proof-of-workproof of workreusable proof of work
A simplified version of scrypt is used as a proof-of-work scheme by a number of cryptocurrencies, first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and Litecoin soon after.

RSA Security

RSARSA LaboratoriesRSA Data Security
Previous password-based KDFs (such as the popular PBKDF2 from RSA Laboratories) have relatively low resource demands, meaning they do not require elaborate hardware or very much memory to perform.

Application-specific integrated circuit

ASICASICsapplication specific integrated circuit
They are therefore easily and cheaply implemented in hardware (for instance on an ASIC or even an FPGA).

Field-programmable gate array

FPGAFPGAsfield programmable gate array
They are therefore easily and cheaply implemented in hardware (for instance on an ASIC or even an FPGA).

Pseudorandomness

pseudorandompseudo-randompseudo-random numbers
The large memory requirements of scrypt come from a large vector of pseudorandom bit strings that are generated as part of the algorithm.

Space–time tradeoff

time–memory tradeofftime–space tradeofftime–memory trade-off
This sort of time–memory trade-off often exists in computer algorithms: speed can be increased at the cost of using more memory, or memory requirements decreased at the cost of performing more operations and taking longer.

Salt (cryptography)

saltsaltedunsalted
Salt - A string of characters that modifies the hash to protect against Rainbow table attacks

Salsa20

ChaChaChaCha20ChaCha20 algorithm
Where Salsa20/8 is the 8-round version of Salsa20.

Rainbow table

rainbow tablessuitable look-up list
Salt - A string of characters that modifies the hash to protect against Rainbow table attacks

Graphics processing unit

GPUGPUsgraphics processor
Mining of cryptocurrencies that use scrypt is often performed on graphics processing units (GPUs) since GPUs tend to have significantly more processing power (for some algorithms) compared to the CPU.

14 nanometer

14 nm16 nm14
As of 2016, InnoSilicon claims to have 14 nm technology with an efficiency of 1.5 µJ/hash.

Crypt (C)

cryptcrypt(3)crypt()
crypt, password storage and verification scheme

Blowfish (cipher)

Blowfish448-bit BlowfishBlowfish encryption algorithm
bcrypt, password hashing function using Blowfish

Tarsnap

In cryptography, scrypt (pronounced "ess crypt" ) is a password-based key derivation function created by Colin Percival, originally for the Tarsnap online backup service.

Coinye

Coinye, formerly Coinye West, is an abandoned scrypt-based cryptocurrency that became embroiled in a trademark infringement lawsuit for using the likeness of American hip hop artist Kanye West as its mascot, despite West having no affiliation with the project.