Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

For password hashing, only short-output or broken hash functions have practical collision concerns. The odds of any random collision with a 256-bit hash, and not with a specific hash, is 50% at 2^128 inputs. Salting is a defense against precomputation attacks like rainbow tables and masking password reuse. Attackers crack password dumps by trying known password combinations, previously compromised passwords, brute force up to a certain length, etc. and using the hashing algorithm to compare the output.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: