[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 24 Aug 2008 14:29:22 +0100
From: "Larry Bonner" <larry.bonner1@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: "new" libc crypt functions
the algorithm SHACrypt is based on MD5Crypt
see details here: http://people.redhat.com/drepper/sha-crypt.html
the main differences are greater salt length, modular rounds in main
hashing routine and of course using sha256 or sha512 as you say.
its possible to create a SIMD version of this algorithm, whereas with
bcrypt, it isn't.(correct me if wrong)
so i still believe bcrypt to be more secure for just that reason, only
my opinion of course :)
On 8/23/08, RB <aoz.syn@...il.com> wrote:
> I wasn't aware of the additions until a few weeks ago, but found out
> that pam_unix now offers SHA256 ($5$) and SHA512 ($6$) hashes. Any
> thoughts on implementing them, or what the speed comparison may be to
> the blowfish hashes? Just an interesting development, it's not often
> the core libraries offer new encryption methods - used to seeing TLB
> or pam_unix2 for alternate hashes.
>
>
> RB
>
> --
> To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
> to the automated confirmation request that will be sent to you.
>
>
--
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ