|
Message-ID: <a82a919e0808240629wdf71b55r360a2e1ef8c83d75@mail.gmail.com> Date: Sun, 24 Aug 2008 14:29:22 +0100 From: "Larry Bonner" <larry.bonner1@...il.com> To: john-users@...ts.openwall.com Subject: Re: "new" libc crypt functions the algorithm SHACrypt is based on MD5Crypt see details here: http://people.redhat.com/drepper/sha-crypt.html the main differences are greater salt length, modular rounds in main hashing routine and of course using sha256 or sha512 as you say. its possible to create a SIMD version of this algorithm, whereas with bcrypt, it isn't.(correct me if wrong) so i still believe bcrypt to be more secure for just that reason, only my opinion of course :) On 8/23/08, RB <aoz.syn@...il.com> wrote: > I wasn't aware of the additions until a few weeks ago, but found out > that pam_unix now offers SHA256 ($5$) and SHA512 ($6$) hashes. Any > thoughts on implementing them, or what the speed comparison may be to > the blowfish hashes? Just an interesting development, it's not often > the core libraries offer new encryption methods - used to seeing TLB > or pam_unix2 for alternate hashes. > > > RB > > -- > To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply > to the automated confirmation request that will be sent to you. > > -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.