Re: Default password hash

看板FB_security作者時間13年前 (2012/06/11 17:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串29/47 (看更多)
Damian Weber <dweber@htw-saarland.de> writes: > *collision* attacks are relatively easy these days, but against 1 MD5,=20 > not against 1000 times MD5 I'm not talking about collision attacks, I'm talking about brute-forcing hashes. > there is a NIST hash competition running, the winner will soon be announc= ed > (and it won't be SHA256 or SHA512 ;-) > http://csrc.nist.gov/groups/ST/hash/timeline.html > so my suggestion would be to use all of the finalists - especially > the winner - for password hashing > * BLAKE > * Gr=C3=B8stl=20 > * JH > * Keccak > * Skein > see, for example, http://www.nist.gov/itl/csd/sha3_010511.cfm There's a world of difference between switching the default to an algorithm we already support and which is widely used by other operating systems, and switching to a completely knew and untested algorithm. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1FrRFEQe (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1FrRFEQe (FB_security)