This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/16522] On sha* password generation, select hash rounds to achieve given computation time based on hash computation speed


https://sourceware.org/bugzilla/show_bug.cgi?id=16522

--- Comment #4 from David JaÅa <jasa.david at gmail dot com> ---
(In reply to David JaÅa from comment #3)
> ...
> 
> Very fast serve means these days a lot of cores, doesn't it? If so, then the
> performance gap is still big, but manageable. I'd still prefer "reasonably
> secure by default even if it causes noticeable nuisance on worst 10 % of
> devices" over "it works everywhere b

... but it's easily breakable by casual attackers.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]