| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAOLP8p5SukvwSaKfCCgH5-3=hqya0jn60GWkLpqPenMg6Lm0oA@mail.gmail.com> Date: Tue, 4 Feb 2014 18:19:20 -0500 From: Bill Cox <waywardgeek@...il.com> To: discussions@...sword-hashing.net Subject: Re: [PHC] Re: NoelKDF ready for submission On Tue, Feb 4, 2014 at 6:03 PM, Bill Cox <waywardgeek@...il.com> wrote: > On Tue, Feb 4, 2014 at 2:01 PM, Steve Thomas <steve@...tu.com> wrote: >>> xorIntoHash() needs to be replaced preferably with a cryptographic hash that >> uses more than the last hash's size bytes of data. Looking more closely, I see there is an issue if doing a client-independent update, since the old hash is not run through PBKDF2-SHA256 to initialize wordHash. I haven't checked this hash update code well enough. The new hash may be too correlated with the old hash in this case. I probably need a call to PBKDF2 in the garlic loop to cleanse any correlations between hashes. Bill
Powered by blists - more mailing lists