Default password hash
Lev Serebryakov
lev at FreeBSD.org
Mon Jun 11 10:44:08 UTC 2012
Hello, Simon.
You wrote 10 июня 2012 г., 14:02:50:
SLBN> Has anyone looked at how long the SHA512 password hashing
SLBN> actually takes on modern computers?
Modern computers are not what should you afraid. Modern GPUs are.
And they are incredibly fast in calculation of MD5, SHA-1 and SHA-2.
Modern key-derivation schemes must be RAM-heavy, not CPU-heavy.
And I don't understand, why should we use our home-grown
"strengthening" algorithms instead of "standard" choices: PBKDF2[1],
bcrypt[2] and (my favorite) scrypt[3].
[1] http://tools.ietf.org/html/rfc2898
[2] http://static.usenix.org/events/usenix99/provos/provos_html/node1.html
[3] http://www.tarsnap.com/scrypt.html
--
// Black Lion AKA Lev Serebryakov <lev at FreeBSD.org>
More information about the freebsd-security
mailing list