I think no.
I don` t know much about phpass() but this is the description:
- Hash algorithm (blowfish, DES, or MD5 in that order if available)
- Salt (random unique salt generated for each password)
- Iterations or password stretching (a specified number of iterations or rounds set as desired)
Source:
http://resources.infosecinstitute.com/wo...rd-hashes/
I read something about several thousand iterations but that seems to be defined by it` s user. In this case yes. Cracking takes much time. Unique salts, xxxxk iterations etc. is much computing.
So much you can see it as attackvector.
http://stackoverflow.com/questions/58416...algorithms
I don` t know much about phpass() but this is the description:
- Hash algorithm (blowfish, DES, or MD5 in that order if available)
- Salt (random unique salt generated for each password)
- Iterations or password stretching (a specified number of iterations or rounds set as desired)
Source:
http://resources.infosecinstitute.com/wo...rd-hashes/
I read something about several thousand iterations but that seems to be defined by it` s user. In this case yes. Cracking takes much time. Unique salts, xxxxk iterations etc. is much computing.
So much you can see it as attackvector.
http://stackoverflow.com/questions/58416...algorithms