lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAOLP8p5JJZOYNhYP-sNHi4vmtbTiFPRzoo2KWW7jHZVcR=vQHQ@mail.gmail.com>
Date: Thu, 17 Apr 2014 08:49:52 -0400
From: Bill Cox <waywardgeek@...il.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] Re: The best of the best, IMO

On Mon, Apr 14, 2014 at 9:06 AM, Bill Cox <waywardgeek@...il.com> wrote:

> Centrifuge, like several others, did not encode input lengths, and has
> input collisions as a result.  In this case, I think appending 0 bytes to
> either password or salt, up to a total of 16 bytes, has no effect on the
> result.
>

I got an email off-list suggesting that I am wrong on this point, and I am!
 Sorry to the Centrifuge author.  There are no salt/password collisions in
Centrifuge.

Bill

Content of type "text/html" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ