Hash Truncation #14
dashawn888
started this conversation in
Ideas
Replies: 1 comment 3 replies
-
|
I think this is a good idea and am down to implement it - any starting points for the truncation amount you would suggest? |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
What do you guys think about truncating the hash for reduced value to anyone obtaining the pbkdf2 hash? If you think this is valuable I don't mind submitting a patch.
The idea being that if you truncate the hash you make it much harder to brute force the hash without having tons of false positive passwords.
IE. Smaller just to save space
pbkdf2("password") = f1ca f3c0 67db 8563
vs
pbkdf2("password") = f1ca f3c0 .truncated.
Choose the truncation length so that it's plenty of data to make false positives from the user 1/1,000,000,000 but make a brute forcing attempt come up with 1,000,000,000 of possible valid passwords and modification to existing password cracking algorithms?
Thanks,
Shawn
Beta Was this translation helpful? Give feedback.
All reactions