TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The Definitive Guide to Cryptographic Hash Functions (Part II) | Varonis

8 点作者 dsgibson2将近 13 年前

1 comment

chubbard将近 13 年前
This is a little out of date information. Dictionary attacks and publicly accessible Rainbow tables have existed for quite some time (late 90s probably). Salting your passwords was an important way to break rainbow tables, but doesn't prevent, only slows down, dictionary attacks. And now with GPU assisted computations salting techniques won't protect you. I almost think discussions like this should just cut to the chase and say use Bcrypt with proper iteration counts to thwart modern brute force attacks. I realize this is a 3 part series, but talking about rainbow tables is like discussing the proper way to hold your buggy whip.