On Jul 31, 2009, at 12:38 AM, Yarko Tymciurak wrote:

> On Fri, Jul 31, 2009 at 2:31 AM, Jonathan Lundell  
> <[email protected]> wrote:
>
> On Jul 31, 2009, at 12:16 AM, Bottiger wrote:
>
> .....
> The difference is that with a deterministic transform of the password
> (this includes static salt, or salt that's a function of the base
> password), the attacker performs your loop once and solves every
> password in his list. And the loop result can be precomputed into a
> rainbow table.
>
> How do you figure?  If the salt is different, and is based on the  
> "solution" of the hash,
> then how does having an algorithm to extract the salt help?  You  
> cannot use the last
> salt to help;  you have to solve the next hash to get it's value  
> (you can check it after).
>
> Am I missing something?

Give me a specific example of the salted hash function you'd use for  
this mechanism, please.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/web2py?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to