Skip to main content

Questions tagged [password-hashing]

Irreversibly converting user-selected passwords into authentication tokens that can be safely stored e.g. in a user database. Typically done with a salted password-based key derivation function (PBKDF), ideally with a memory-hard mixing stage to thwart brute-force attacks using parallel hardware.

4 votes
1 answer
259 views

Adversaries got hold of a database of password hashes. They want to find the password for at least one of the hash. They'll try $k$ passwords on each of $h$ hashes. We assume they know enough about ...
fgrieu's user avatar
  • 151k
4 votes
3 answers
612 views

We have a spring boot application, which previously used BCrypt to hash the passwords. Those hashed passwords eventually ended up in database. Now the ask is to switch the hashing algorithm to Argon2. ...
hell_storm2004's user avatar
2 votes
1 answer
123 views

Is the only difference between password hashing for deriving a key versus for verifying a password in how the algorithms are used? That the design requirements for an algorithm for either are ...
Melab's user avatar
  • 4,328
1 vote
1 answer
217 views

Playing around with some ideas for a hash-function using simple primitives, I came up with this construction: Select two large safe primes, $B$ and $M$, where $B < M$. Define $C$ as the ...
Sir Galahad's user avatar
2 votes
0 answers
58 views

So the Cisco IOS password "encryption" type 7 uses the 4 bit salt/seed to decide which part of the static key to start encrypting from, but I can't find any details on how this salt is ...
n-l-i's user avatar
  • 1,124
1 vote
0 answers
55 views

Would it be feasible to create a blockchain-based system where data hashes are stored in the blockchain, replicated across all nodes, and protected by a self-destruct mechanism? In this system, if a ...
cawani_'s user avatar
  • 11
1 vote
1 answer
194 views

I'm currently studying the security mechanisms used by 1Password, particularly the Two-Secret Key Derivation (2SKD) sequence as described in section 8.2.1 of their white paper. Here's the specific ...
gradientsearch's user avatar
2 votes
1 answer
184 views

Stock 7-Zip AES-256 encryption runs your password through a hash function 524,288 times ($2^{19}$). Source 1 Source 2 This is considered to be Not very good compared to a standard amount of Argon2 or ...
user125888's user avatar
0 votes
0 answers
62 views

I would like to ask about vulnerabilities of the following algorithm for a password manager. It is structured as follows: There is a master password UTF-8 10 characters long, not to be stored anywhere....
Fabius Wiesner's user avatar
3 votes
2 answers
183 views

I have 2 unique random 256-bit keys, 1 is public, 1 is secret that need to be combined into 1 secret key. In my search, I found that HMAC is more suited for this purpose and does not require an ...
Kim Mỹ's user avatar
  • 205
5 votes
1 answer
166 views

For password hashing, is it better to compute a pseudorandom data-independent memory access pattern using the salt, the cost parameters (memory size, iterations, and parallelism), or some other way? ...
samuel-lucas6's user avatar
0 votes
1 answer
123 views

I'm thinking about a page-level encryption scheme for a database, the general structure would be something like the following: Derive KEY from PASSWORD and SALT using libsodium's Argon2ID Encrypt ...
Mathieu Borderé's user avatar
0 votes
0 answers
79 views

I am new to cyber security and I do know the basics of password hashing works. However, I have not been able to find an answer online to my query- although I think that it is a stupid and somewhat ...
security_paranoid's user avatar
0 votes
1 answer
125 views

I have been practicing using Manuel Blum's Mental Hash Function for personal use, described in the link below: Mental Cryptography and Good Passwords However, Rob Shearer has shown that the function ...
its.just.me's user avatar
1 vote
1 answer
215 views

So I was reading through an article about how passwords are salted and hashed through a cryptographic function here, and found out that hashed passwords, along with the plaintext salt values are ...
mantot123's user avatar
  • 111

15 30 50 per page
1
2 3 4 5
20