lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <8A3DF897-2833-4235-A37F-AC670408124D@manico.net>
Date: Tue, 25 Mar 2014 23:08:23 +0530
From: Jim Manico <jim@...ico.net>
To: "discussions@...sword-hashing.net" <discussions@...sword-hashing.net>
Subject: Re: [PHC] New password hashing entry: PolyPassHash

>  the password hashes, in my view, must themselves provide adequate security even when that secret key is compromised.

If we cannot depend on proper key management for high-risk, scalable systems then all hope and all crypto is lost. Why are key-based solutions for password storage like HMACs (in specialized circumstances) so frowned upon by some of the crypto community, when key management is fundamental to so many other aspects of secure systems?

With respect,
And •stoked• to see this work underway,
--
Jim Manico
@Manicode
(808) 652-3805

> On Mar 25, 2014, at 10:55 PM, Peter Maxwell <peter@...icient.co.uk> wrote:
> 
> the password hashes, in my view, must themselves provide adequate security even when that secret key is compromised.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ