TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Definitive Guide to Cryptographic Hash Functions (Part II) | Varonis

8 pointsby dsgibson2almost 13 years ago

1 comment

chubbardalmost 13 years ago
This is a little out of date information. Dictionary attacks and publicly accessible Rainbow tables have existed for quite some time (late 90s probably). Salting your passwords was an important way to break rainbow tables, but doesn't prevent, only slows down, dictionary attacks. And now with GPU assisted computations salting techniques won't protect you. I almost think discussions like this should just cut to the chase and say use Bcrypt with proper iteration counts to thwart modern brute force attacks. I realize this is a 3 part series, but talking about rainbow tables is like discussing the proper way to hold your buggy whip.