lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 17 Sep 2014 14:57:08 -0700 From: epixoip <epixoip@...dshell.nl> To: discussions@...sword-hashing.net Subject: Re: [PHC] omegacrypt and timing On 9/17/2014 2:53 PM, Krisztián Pintér wrote: > epixoip (at Wednesday, September 17, 2014, 11:12:57 PM): > >> The primary goal of password hashing is to defend against offline >> attacks in the event that a password database has been compromised. > you don't get to choose the attack model. attackers choose the attack > model. to be precise, you choose the attack model, but if you want > yourself to be taken seriously, you need to consider all viable attack > routes. simply declaring an attack "not primary" will not help you > defend data. Then you do not seem to understand what Threat Modeling is.
Powered by blists - more mailing lists