SHA512 Info
#2
So it's just straight SHA512 with no salt? I don't think you realize how bad that is. If an attacker steals your entire database, they can attack all the passwords simultaneously because they aren't salted (calculate the hash of a plaintext once, compare it to every stored hash). Also if you're using the hashing algorithm with just a single round, that's intended for file integrity or message integrity, not resistance to cracking. You need to add thousands of rounds of the algorithm to force an attacker to do lots of work. Look at techniques like PBKDF.

See this blog post for more info: http://dankaminsky.com/2012/01/05/salt-t...omplexity/

PS your screenshot appears to be from Hashcat, which is a CPU-only tool. It's not even using the GPU.
Reply


Messages In This Thread
SHA512 Info - by Joey Tang - 02-15-2012, 12:12 AM
RE: SHA512 Info - by chort - 02-15-2012, 12:39 AM
RE: SHA512 Info - by Joey Tang - 02-15-2012, 12:49 AM
RE: SHA512 Info - by atom - 02-24-2012, 04:23 PM
RE: SHA512 Info - by pragmatic - 04-27-2012, 07:55 PM
RE: SHA512 Info - by atom - 04-27-2012, 09:05 PM
RE: SHA512 Info - by pragmatic - 04-27-2012, 10:43 PM