Re: PHK's MD5 might not be slow enough anymore

看板FB_security作者時間16年前 (2010/01/29 06:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串14/35 (看更多)
What would be the consequence of having an algorithm that will increase the amount of time needed to check the next password after a failure. In other words, check the first one fast, the second try it will be slower, then the third even slower and then the forth even slower etc. Is this how it is currently implemented? (Sorry I did not read the code). -r _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1BOWaVUn (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1BOWaVUn (FB_security)