| 
	
 | 
 Posted by Volker Hetzer on 09/02/05 18:23 
Erwin Moller wrote: 
> I don't want to ruin this party, but if you safe md5(password) you might as  
> well store them plaintext. 
> MD5 has had its best days. :-( 
[...] 
> I also read some smart@ss at slashdot improved on this, and now it can be  
> done on a run-of-the-mill PC in 1 second. 
15min is the last estimate I know, but that's a few months old. 
 
> So: effectively MD5 is broken. Do not use it. 
 
Depends on what this guys choices are and how much effort an attacker 
is going to spend on getting a password. 
a) In a web application you typically deal with the 
    name-of-my-neighbour's-hamster class of passwords (unless it's a bank). 
    For instance, a truly random password of 6 lowercase letters and digits 
    has about 31bit of entropy in it, words something in the 10 to 20bit 
    range. 
    No attacker will attack md5 for this, they run some crack-like guesser 
    and that's it. 
b) His toolkit may not have anything better to offer, in particular 
    not SHA256. 
 
Also, typically you salt passwords, i.e. combine them with another random 
string. (frizzle, you *do* that, don't you?) 
If the attacker doesn't steal the password hashes *and* the random 
strings he can't do anything. If he can break into your system and steal 
a file, you've IMHO got a way bigger problem than what hash function you chose. 
 
Lots of Greetings! 
Volker
 
  
Navigation:
[Reply to this message] 
 |