yescrypt is a password-based key derivation function based on scrypt.
Advantages (compared to scrypt and Argon2):
- Improving resistance to offline attacks (due to an increase in the cost of an attack at the same cost to the defending side).
- Additional functionality (for example, in the form of the ability to switch to more secure settings without knowing the password) out of the box.
- Use of NIST approved cryptographic primitives.
- It remains possible to use SHA-256, HMAC, PBKDF2 and scrypt.
There are also disadvantages, which are described in more detail on project page.
Since the previous news (yescrypt 1.0.1) had several minor releases.
Release changes 1.0.2:
-
MAP_POPULATE is no longer used, as the new multi-threaded tests showed more negative effects than positive ones.
-
SIMD code now reuses input and output buffers in BlockMix_pwxform in SMix2. This can marginally improve cache hit rates and therefore performance.
Changes in release 1.0.3:
- SMix1 has optimized V indexing for sequential writes.
Changes in release 1.1.0:
- Yescrypt-opt.c and yescrypt-simd.c have been merged, and the "-simd" option is no longer available. With this change, the performance of SIMD assemblies should be almost unchanged, but scalar assemblies should be faster on 64-bit architectures (but slower on 32-bit ones) with more registers.
Also yescrypt is now part of the library libxcrypt, which is used by the Fedora and ALT Linux distributions.
Source: linux.org.ru