Re: Default password hash

看板FB_security作者時間13年前 (2012/06/11 04:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串27/47 (看更多)
On 06/10/2012 06:02 AM, Simon L. B. Nielsen wrote: > Has anyone looked at how long the SHA512 password hashing actually > takes on modern computers? The "real" solution for people who care > significantly about this seems something like the algorithm pjd > implemented (I think he did it at least) for GELI, where the number of > rounds is variable and calculated so it takes X/0.X seconds on the > specific hardware used. That's of course a lot more complicated, and > I'm not sure if it would work with the crypt() API. I'm kinda curious about this: I take it you'd encode the number of rounds in the string somehow? Otherwise, the hash wouldn't be portable to another machine (or even if you upgrade the current machine). -- Matt Piechota _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1FrGH301 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1FrGH301 (FB_security)