Hacker News new | past | comments | ask | show | jobs | submit login
The Definitive Guide to Cryptographic Hash Functions (Part II) | Varonis (varonis.com)
8 points by dsgibson2 on Aug 14, 2012 | hide | past | favorite | 1 comment



This is a little out of date information. Dictionary attacks and publicly accessible Rainbow tables have existed for quite some time (late 90s probably). Salting your passwords was an important way to break rainbow tables, but doesn't prevent, only slows down, dictionary attacks. And now with GPU assisted computations salting techniques won't protect you. I almost think discussions like this should just cut to the chase and say use Bcrypt with proper iteration counts to thwart modern brute force attacks. I realize this is a 3 part series, but talking about rainbow tables is like discussing the proper way to hold your buggy whip.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: