Hi everyone,

> On 08 Nov 2015, at 00:08, Mark Wardle <m...@wardle.org> wrote:
> 
> I’m using http://www.jasypt.org <http://www.jasypt.org/>
Note that jasypt seems to use a default of "1000 times MD5" on the password, 
which depending on who you ask is not considered that secure anymore (still 
better than simple hashing though of course), especially as rainbow tables and 
GPUs help A LOT in cracking MD5 hashes more easily. Depending on the needs an 
attacker might even not try to crack the hash at all but just create a password 
that matches the same hash (collision). At least for new systems I would advise 
against using that for password protection as the algorithm can be parallelized 
very efficiently (which is what scrypt/bcrypt try to avoid on purpose to avoid 
being speed-cracked on GPUs for example).

Greetings
Dennis

--





-----------------------------------------------------
Dennis Bliefernicht • Backend Development
T +49 40 357 3001 62
dennis.blieferni...@xyrality.com

XYRALITY GmbH • Friedensallee 290 • 22763 Hamburg
www.xyrality.com <http://www.xyrality.com/>
Registergericht: Hamburg HRB 115332
Geschäftsführer: Sven Ossenbrüggen
-----------------------------------------------------

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Webobjects-dev mailing list      (Webobjects-dev@lists.apple.com)
Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/webobjects-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to