This is Gergő Tisza's Typepad Profile.
Join Typepad and start following Gergő Tisza's activity
Join Now!
Already a member? Sign In
Gergő Tisza
Recent Activity
If you could mimic another person's fingerprint or DNA at will, you could do some seriously evil stuff. MD5 is clearly compromised, and SHA-1 is not looking too great these days. Collision attacks against MD5/SHA1 are nothing like mimicking another person's DNA; they are like the ability to create twins who share the same DNA. As you can guess from the lack of frauds committed by evil twins, that ability is not very dangerous. The same is true in cryptography: collision attacks can be problematic in some cases (such as when a hash is used to digitally sign a message), but completely irrelevant to cracking passwords. As for figuring out the plaintext which hashes to a certain string, that is called a first preimage attack, and no such attack is known against either SHA1 or MD5 (or even MD4). So SHA1/MD5 is just as secure for password hashing as SHA-256 or any other fast cryptographic hash. (Which is to say, not very secure - as the article correctly explains.) Use bcrypt or PBKDF2 exclusively to hash anything you need to be secure. These new hashes were specifically designed to be difficult to implement on GPUs. I don't think PBKDF2 was specifically designed to be GPU-unfriendly - it was just designed to be slow.
Toggle Commented Apr 6, 2012 on Speed Hashing at Coding Horror
Gergő Tisza is now following The Typepad Team
Apr 6, 2012