Re: Default password hash

看板FB_security作者時間13年前 (2012/06/09 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串8/47 (看更多)
--lMM8JwqTlfDpEaS6 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri 08 Jun 2012 05:47 PM, RW wrote: > On Fri, 08 Jun 2012 14:51:55 +0200 > Dag-Erling Sm=C3=B8rgrav wrote: >=20 > > We still have MD5 as our default password hash, even though known-hash > > attacks against MD5 are relatively easy these days. =20 >=20 > Are any of those attacks relevant to salted passwords even with a > single MD5 hash, let alone FreeBSD's complicated iterative algorithm?=20 Complication isn't your friend when considering cryptography. --=20 With kind regards, Ruud Althuizen --lMM8JwqTlfDpEaS6 Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (FreeBSD) iEYEARECAAYFAk/SNlkACgkQkqncCMFskRU+NgCfXMQOI9o3edJJDVEeqQQB3qQT OJsAoIMswOLjYAWVS5XKEs2Sci5iB7AJ =fysR -----END PGP SIGNATURE----- --lMM8JwqTlfDpEaS6--
文章代碼(AID): #1FqZtV8q (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1FqZtV8q (FB_security)