Hacker News new | past | comments | ask | show | jobs | submit login

Since when is your salt suppose to be secret?



>Since when is your salt suppose to be secret?

In the instance of this particular algorithm, the salt must be kept secret, because it is the only unknown in the process from an attackers point of view.


Not true, you have to input a master password (it's what the ';sha512sum -' part does), which is also unknown to the attacker.


Fair enough, but then the "salt" is not really a "salt" anymore as that term is known from "password salt", because it is no longer a random input value unique to each different password. It is simply a piece of known-plaintext input for every "hashing" session.

That means that an attacker who can somehow obtain the salt value can now mount a known-plaintext attack against the outputs of the algorithm. http://en.wikipedia.org/wiki/Known-plaintext_attack

I am ignoring the fact that in a general sense an attacker with resources to obtain the salt can also likely log the master password, in which case no attack against the algorithm is necessary.


Well, if that's true one should change the algorithm :)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: