[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <d1a2cf581a9143029b107470b4886487@BY2PR03MB074.namprd03.prod.outlook.com>
Date: Tue, 14 Jan 2014 00:37:06 +0000
From: Marsh Ray <maray@...rosoft.com>
To: "' (discussions@...sword-hashing.net)'" <discussions@...sword-hashing.net>
Subject: A must read...
It always bears repeating that the password-cracking attacker typically has many candidate guesses he can try in parallel, and usually has many hash values he wishes to target. How do you prevent him from hiding latencies in long pipelines? (longer than those that would be tolerable in defenders' branch-happy general purpose systems)
A must read for those who haven't seen it before:
Bernstein - Understanding Brute Force
http://cr.yp.to/snuffle/bruteforce-20050425.pdf
- Marsh
Content of type "text/html" skipped
Powered by blists - more mailing lists