Custom password separator in md5($salt.$pass)
#4
This is because atom creates custom optimized modules per hash type. If anyone requests md5($salt.$pass) with a 9 char salt (your 8 random chars + "/"), your hashes will be as weak as any other salted md5.

If you really want to make hashes hard to crack, you need to make it slow. Use something like PBKDF2, not cheap self made pseudo secure crap.


Messages In This Thread
RE: Custom password separator in md5($salt.$pass) - by undeath - 04-11-2012, 12:24 AM