Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 24 Aug 2008 14:29:22 +0100
From: "Larry Bonner" <larry.bonner1@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: "new" libc crypt functions

the algorithm SHACrypt is based on MD5Crypt
see details here: http://people.redhat.com/drepper/sha-crypt.html

the main differences are greater salt length, modular rounds in main
hashing routine and of course using sha256 or sha512 as you say.

its possible to create a SIMD version of this algorithm, whereas with
bcrypt, it isn't.(correct me if wrong)

so i still believe bcrypt to be more secure for just that reason, only
my opinion of course :)

On 8/23/08, RB <aoz.syn@...il.com> wrote:
> I wasn't aware of the additions until a few weeks ago, but found out
> that pam_unix now offers SHA256 ($5$) and SHA512 ($6$) hashes.  Any
> thoughts on implementing them, or what the speed comparison may be to
> the blowfish hashes?  Just an interesting development, it's not often
> the core libraries offer new encryption methods - used to seeing TLB
> or pam_unix2 for alternate hashes.
>
>
> RB
>
> --
> To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
> to the automated confirmation request that will be sent to you.
>
>

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.