Alexander Klimov wrote:


(Of course, with 60K passwords there is almost for sure at
least one "password1" or "Steven123" and thus the salts are

I'm not sure I understand this statement as I just calculated the HMAC MD5 for "password1" using a salt of 7D00 (32,000 decimal) and got the result of 187de1db3348592a3595905a66cae418. Then I calculated the MD5 with a salt of 61A8 (25,000 decimal) and got a result of 9cad6ac9f5555d6c09fd8e99e478381f.

Are you saying that the salt is irrelevant because a dictionary attack is fast and common dictionary words would allow an easy attack?



The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to