Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 29 Oct 2022 11:09:41 +0200
From: Matthias Apitz <>
Subject: Re: Improving security of old DES hashes with fixed salt
 with "yescrypt"

Thanks for your hints, Alexander.

The C-written tool, based on the SLES Linux, will read on STDIN
and expects



If only the "PIN\0" is seen, this is encrypted with DES and the result
with yescrypt. If "PIN\0yescrypt-hash\0" is seen, the PIN is also DES plus
yescrypt encrypted, but the latter using "yescrypt-hash" as salt, and compared
the result against "yescrypt-hash".

The output on STDOUT will be one of the following:

- a yescrypt-hash, if only PIN\0 was seen;
- the word "matched" if PIN was correct
- the word "nomatch" if PIN was incorrect
- the word "error" when something unusual happend.

and exit(0) is called.



Matthias Apitz, ‚úČ, +49-176-38902045
Public GnuPG key:

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.