[105646] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Password hashing

daemon@ATHENA.MIT.EDU (Leichter, Jerry)
Thu Oct 18 14:16:00 2007

Date: Mon, 15 Oct 2007 10:20:53 -0400 (EDT)
From: "Leichter, Jerry" <leichter_jerrold@emc.com>
To: Sandy Harris <sandyinchina@gmail.com>
cc: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <c5528eee0710121747i200c53e4jaa1e433429627a39@mail.gmail.com>

| > ...  What's wrong with starting
| > with input SALT || PASSWORD and iterating N times, ....
| 
| Shouldn't it be USERID || SALT || PASSWORD to guarantee that if
| two users choose the same password they get different hashes?
| It looks to me like this wold make dictionary attacks harder too.
As others have pointed out, with a large enough salt, dictionary attacks
become impossible.  But it's worth mentioning another issue:  People's
userid's do change and it's nice not to have the hashed passwords break
as a result.  (This is pretty counter-intuitive to users who change their 
names, and a disaster if a large organization needs to do a mass renaming
and somehow has to coordinate a mass password update at the same time.)

							-- Jerry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post