Why isn’t it more popular to increase the p (parallelization) parameter of scrypt?

First of all, the understanding I have of the p parameter in scrypt is that it multiplies the amount of work to do, but in such a way that the additional workloads are independent from each other, and can be run in parallel. With the inter… Continue reading Why isn’t it more popular to increase the p (parallelization) parameter of scrypt?

Scrypt KDF cipher – known vulnerabilities and cryptanalysis? [migrated]

There is a scrypt cipher which is used for exmaple by some cryptos like LItecoin for their mining algorithm.

I never heard of scrypt. I know eg SHA256 which is well analyzed and considered as secure until now.

ANy known crypatanalysi… Continue reading Scrypt KDF cipher – known vulnerabilities and cryptanalysis? [migrated]

Is it possible decrypt Android 8 encryption, if the device encryption key is gone (but with a known PIN and KEK)?

main question is in the title. Some clarification though:

When you factory reset your encrypted phone, the old device encryption key (DEK a) gets deleted and a new encryption key (DEK b) is being generated, which is used to … Continue reading Is it possible decrypt Android 8 encryption, if the device encryption key is gone (but with a known PIN and KEK)?

In 2018, what is the recommended hash to store passwords: bcrypt, scrypt, Argon2?

There are many questions about picking a hash function, including How to securely hash passwords? or Are there more modern password hashing methods than bcrypt and scrypt?, with very detailed answers, but most of them date quite a bit.
The… Continue reading In 2018, what is the recommended hash to store passwords: bcrypt, scrypt, Argon2?