Re: password encryption
От | David F. Skoll |
---|---|
Тема | Re: password encryption |
Дата | |
Msg-id | Pine.LNX.4.44.0208212137490.22466-100000@shishi.roaringpenguin.com обсуждение исходный текст |
Ответ на | Re: password encryption (Tim Ellis <Tim.Ellis@gamet.com>) |
Ответы |
Re: OT: password encryption (salt theory)
|
Список | pgsql-admin |
On Wed, 21 Aug 2002, Tim Ellis wrote: > I always run my passwords through md5sum(), which is an open source > implementation, and thus seems to've been written in every language out > there. But a straight md5sum leaves you open to a dictionary attack. You want to add some salt by doing something like this: salt = random_4_char_string; encrypted_password = salt + md5sum(salt + cleartext_password); To verify, just extract the salt from the encrypted password and redo the calculation. A dictionary attack is now much less feasible because the same cleartext password can encrypt to millions of different ciphertext passwords. -- David.
В списке pgsql-admin по дате отправления: