![]() For example, you could use the output of the hashing function as an input to the same (or a different) hashing function. Ideally, the algorithm that you choose should be fast enough on CPUs but not fast or economical enough on GPUs, FPGAs or ASICs to make a brute force attack possible.Īnother additional step that you could take to protect passwords is to apply multiple iterations of hashing to the user’s password. This is important in order to make brute force attacks prohibitive.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |