On Wed, 7 Sep 2016, Andreas Bartelt wrote:
> yes, due to the larger internal state of the blowfish algorithm which is
> harder to efficiently realize in dedicated hardware. However, since bcrypt's
> internal state effectively is of fixed size, scrypt would be an even better
> option since it
On 09/07/16 09:16, Damien Miller wrote:
On Tue, 6 Sep 2016, David Coppa wrote:
Il 6 settembre 2016 14:56:32 CEST, Filippo Valsorda ha
scritto:
Hello,
I recently had the occasion to dive into the softraid crypto code [1]
and was quite pleased with the cleanliness of it all.
On Tue, 6 Sep 2016, David Coppa wrote:
> Il 6 settembre 2016 14:56:32 CEST, Filippo Valsorda ha
> scritto:
> >Hello,
> >
> >I recently had the occasion to dive into the softraid crypto code [1]
> >and was quite pleased with the cleanliness of it all. However, I found
>
Il 6 settembre 2016 14:56:32 CEST, Filippo Valsorda ha
scritto:
>Hello,
>
>I recently had the occasion to dive into the softraid crypto code [1]
>and was quite pleased with the cleanliness of it all. However, I found
>surprising the default value of 8k PBKDF2 rounds.
>
>I know
On Tue, Sep 06, 2016 at 01:56:32PM +0100, Filippo Valsorda wrote:
> Hello,
>
> I recently had the occasion to dive into the softraid crypto code [1]
> and was quite pleased with the cleanliness of it all. However, I found
> surprising the default value of 8k PBKDF2 rounds.
>
> I know it is easy
Hello,
I recently had the occasion to dive into the softraid crypto code [1]
and was quite pleased with the cleanliness of it all. However, I found
surprising the default value of 8k PBKDF2 rounds.
I know it is easy to override and I should have RTFM, but I (naively,
I'll admit) assumed OpenBSD