As a hash function with 'security' of 2 ** 80, it is completely
broken. The security is reduced to 2 ** 69. Even though it's still
alot of operations, the function is definately broken as it's actual
security is less then specified (less then that required for a
'birthday attack').

-- Michael

On 4/26/05, Edgar Danielyan <[EMAIL PROTECTED]> wrote:
> David, John,
> 
> Although there were some advances on finding collisions in SHA-1 I
> wouldn't say it was broken. The attack is fairly unpractical and
> woudln't affect absolute majority of SHA-1 uses. Having said that
> there are other versions of SHA, e.g. SHA-256 which are not affected
> (at present at least).
> 
> Also in addition to the password a "salt" is very often used to
> address the risk of memory-speed tradeoff (search on google would give
> many references)... In short the best practical option is to use a
> hash digest with salt and store the password hash, not the password
> itself.
> 
> Regards
> 
> Edgar
> 
> 
> On 4/25/05, David Crocker <[EMAIL PROTECTED]> wrote:
> > I'm by no means an expert in the field of security and Java, but I believe 
> > that
> > the usual technique is to encode the password that the user types using a 
> > 1-way
> > hashing algorithm, then store (and hide/protect) the encoded version and use
> > that as the password. If an attacker manages to read the password hash, he 
> > still
> > has to construct a password that will encode to the same value.
> >
> > There are a number of hashing algorithms available. SHA1 used to be 
> > considered
> > fairly good for this sort of thing, but I understand it has been broken
> > recently.
> >
> > This technique does make it impossible to recover the password; if the 
> > password
> > is lost, it has to be reset to a new one.
> >
> > David Crocker, Escher Technologies Ltd.
> > Consultancy, contracting and tools for dependable software development
> > www.eschertech.com
> >
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
> > Of john bart
> > Sent: 25 April 2005 08:56
> > To: SC-L@securecoding.org
> > Subject: [SC-L] Java keystore password storage
> >
> > Hello to all the list.
> > I need some advice on where to store the keystore's password. Right now, i 
> > have
> > something like this in my code:
> >
> > keystore = KeyStore.getInstance("JKS");
> > keystore.load(new FileInputStream("keystore.jks"),"PASSWORD");
> >
> > the question is, where do i store the password string? all of the 
> > possibilities
> > that i thought about are not good enough:
> > 1) storing it in the code - obviously not.
> > 2) storing it in a seperate config file is also not secure.
> > 3) entering the password at runtime is not an option.
> > 4) encrypting the password - famous chicken and egg problem (storing the
> > encryption key)
> >
> > Any ideas?
> >
> >
> 
>


Reply via email to