|
You are here |
crackstation.net | ||
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | | | To securely store passwords they should be hashed with a slow hashing function, such as PBKDF2. PBKDF2 is slow because it calls a fast hash function many times. This blog post explores some properties that the iterations must have to be secure. | |
| | | | |
qsantos.fr
|
|
| | | | | [AI summary] The article discusses the security implications of client-side password hashing, arguing that it can be secure when combined with memory-hard functions and proper implementation. | |
| | | | |
palant.info
|
|
| | | | | Allowing password-based authentication without letting the server know the password is fascinating. Unfortunately, for web applications this doesn't solve any problems. | |
| | | | |
www.latacora.com
|
|
| | | When people talk about PBKDFs (Password Based Key Derivation Functions), this is usually either in the context of secure password storage, or in the context of how to derive cryptographic keys from potentially low-entropy passwords. The Password Hashing Competition (PHC, 2013-2015) was an open competition to derive new password hashing algorithms, resulting in Argon2 hash as its winner. Apart from achieving general hash security, many of the candidates focused on achieving resistance to parallel attacks ... | ||