Re: PHK's MD5 might not be slow enough anymore

看板FB_security作者時間16年前 (2010/01/29 06:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串14/35 (看更多)
At 1:09 PM -0800 1/28/10, Xin LI wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >On 2010/01/28 12:18, Chris Palmer wrote: >> For backwards compatibility, which do people prefer: Creating a new $N$ >> prefix every time we re-tune the algorithm, or using a new notation to say >> how many times this password was hashed? For example: $1.1000$, $1.100000$, >> et c.? > >I'd vote for $1.nnnn$, as a good side effect it would be tunable by the >administrators who want to fine tune the round number as need. Might want to make it something like $1.nnn.bbb$, so the admin can specify the number of bits as well as the number of rounds. And then pick some algorithm where those two values make sense. :-) By going for something tunable, users don't HAVE to change their password the moment the sysadmin decides that it's time for better protection. The sysadmin can change the numbers used when the user changes their password, and then gradually transition everyone to the stronger encryption. It also means that users could decide to use stronger encryption if they are willing to wait for it, without the sysadmin needing to do anything. -- Garance Alistair Drosehn = gad@gilead.netel.rpi.edu Senior Systems Programmer or gad@freebsd.org Rensselaer Polytechnic Institute or drosih@rpi.edu _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1BOWaVNh (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1BOWaVNh (FB_security)