Posts: 1
Threads: 1
Joined: Apr 2012
Hi Folks!
I'm thinking about using a software with the following hash-algorithm: sha1(salt+sha1(salt+pass+salt))
I wanted to check if this algorithm is secure.
As far as I can say, no Bruteforce-Software supports such a algorithm, right? So you would say this method is secure?
thanks!
Posts: 100
Threads: 2
Joined: Mar 2012
(04-30-2012, 09:45 PM)matafor Wrote: Hi Folks!
I'm thinking about using a software with the following hash-algorithm: sha1(salt+sha1(salt+pass+salt))
I wanted to check if this algorithm is secure.
As far as I can say, no Bruteforce-Software supports such a algorithm, right? So you would say this method is secure?
thanks!
No. especially since you have just posted this, it would be absolutely trivial to add this algorithm to a bruteforcer (or write your own).
Additionally, even if you don't divulge the combination, that doesn't guarantee someone can't figure it out, one way or another.
It may help to keep the script-kiddies out, but nothing is unbreakable.
Posts: 414
Threads: 14
Joined: Mar 2012
a similar algorithm, in fact more secure is already bruteforceable :: sha1($salt.sha1($salt.sha1($pass)))
Posts: 23
Threads: 2
Joined: Mar 2012
04-30-2012, 10:18 PM
(This post was last modified: 04-30-2012, 10:20 PM by james123.)
Read up on
security through minority.
Then, once you have realized how silly it is to try to reinvent the wheel by out-smartening ones designed by cryptography geniuses;
Look at the
preexisting algorithms available for you.
More specifically crypt(sha512) or bcrypt().
Posts: 2,301
Threads: 11
Joined: Jul 2010
05-01-2012, 01:41 AM
(This post was last modified: 05-01-2012, 01:42 AM by undeath.)