ASP Classic 中密码的推荐哈希值 [英] Recommended hash for passwords in ASP Classic

查看:12
本文介绍了ASP Classic 中密码的推荐哈希值的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

ASP Classic 中最慢(因此最好)的密码哈希算法是什么?

What is the slowest (therefore best) hash algorithm for passwords in ASP Classic?

对于那些不知道的人,在散列密码时,较慢的散列优先于更快的散列,以帮助减缓彩虹表样式攻击.

For those unaware, when hashing passwords, slower hashes are preferred to faster to help slow rainbow table style attacks.

是的,当然速度并不是哈希选择的唯一有效考虑因素.我的问题假设 所有其他条件相同首选最慢的哈希方法 哈希密码时.虽然碰撞/逆向工程当然也是一个问题,但我在这个问题中优先考虑速度,因为它可以说是比较流行的密码哈希算法时要考虑的最关键因素.

And yes, of course speed isn't the only valid concern for hash selection. My question assumes that All other things being equal, the slowest hash method is preferred when hashing a password. Though collision/reverse engineering is of course a concern too, I'm prioritizing speed in this question since it is arguably the most critical factor to consider when comparing popular hash algorithms for use on passwords.

谢谢!

推荐答案

很多人似乎都在抨击提问者,因为他正在寻找一个缓慢的哈希函数.实际上,在所有其他方面相同的情况下,较慢的散列函数比快的散列函数更安全.这是因为较慢的哈希函数会导致彩虹表的生成速度变慢密码暴力破解或字典攻击速度变慢.

A lot of people seem to be beating on the question-asker because he's looking for a slow hash function. Actually, all other aspects being equal, a slower hash function is more secure than a fast one. This is because a slower hash function results in slower generation of rainbow tables and slower brute forcing or dictionary attacks on the password.

来自 http://www.securityfocus.com/blogs/262 的 Thomas Ptacek,正如这篇编码恐怖文章中所引用的:

From Thomas Ptacek at http://www.securityfocus.com/blogs/262, as referenced in this Coding Horror article:

问题在于 MD5 速度很快.所以是它的现代竞争对手,比如 SHA1和 SHA256.速度是设计目标现代安全散列,因为散列是几乎所有的组成部分密码系统,通常得到在每个数据包上按需执行或基于每条消息.

The problem is that MD5 is fast. So are its modern competitors, like SHA1 and SHA256. Speed is a design goal of a modern secure hash, because hashes are a building block of almost every cryptosystem, and usually get demand-executed on a per-packet or per-message basis.

速度正是您不想要的在密码哈希函数中.

现代密码方案受到攻击使用增量密码破解器.

Modern password schemes are attacked with incremental password crackers.

增量饼干不预先计算所有可能的破解密码.他们考虑每个密码单独散列,然后他们喂他们的通过密码哈希字典功能与您的 PHP 登录方式相同页会.彩虹桌饼干像 Ophcrack 使用空间攻击密码;增量饼干,如开膛手约翰、Crack 和 LC5 作品随着时间:统计和计算.

Incremental crackers don’t precalculate all possible cracked passwords. They consider each password hash individually, and they feed their dictionary through the password hash function the same way your PHP login page would. Rainbow table crackers like Ophcrack use space to attack passwords; incremental crackers like John the Ripper, Crack, and LC5 work with time: statistics and compute.

密码攻击游戏得分破解密码 X 所用的时间.彩虹桌,那时间取决于你的桌子需要多大以及如何快,你可以搜索它.和增量饼干,时间取决于关于您可以多快输入密码哈希函数运行.

The password attack game is scored in time taken to crack password X. With rainbow tables, that time depends on how big your table needs to be and how fast you can search it. With incremental crackers, the time depends on how fast you can make the password hash function run.

您可以更好地优化您的密码哈希函数,越快你的密码哈希函数得到,你的计划较弱.MD5 和 SHA1,甚至像传统的分组密码DES,旨在快速.MD5,SHA1 和 DES 是弱密码哈希.在现代 CPU 上,原始加密像 DES 和 MD5 这样的构建块可以被位切片、矢量化和并行化以进行密码搜索闪电般的快.游戏结束 FPGA实施成本仅数百美元.

The better you can optimize your password hash function, the faster your password hash function gets, the weaker your scheme is. MD5 and SHA1, even conventional block ciphers like DES, are designed to be fast. MD5, SHA1, and DES are weak password hashes. On modern CPUs, raw crypto building blocks like DES and MD5 can be bitsliced, vectorized, and parallelized to make password searches lightning fast. Game-over FPGA implementations cost only hundreds of dollars.

一些对 PHP MD5 文档的评论 还讨论了对缓慢性的偏好.

Some comments on the PHP MD5 documentation also discuss preference for slowness.

要回答您的问题,BCrypt 似乎是要走的路.但是,我还没有找到 ASP Classic 的任何实现.如果这是真的,我会坚持使用像 SHA512 这样的常规哈希函数.

To answer your question, it looks like BCrypt is the way to go. However, I have not been able to find any implementations for ASP Classic. If that's true, I would stick with a regular hash function like SHA512.

这篇关于ASP Classic 中密码的推荐哈希值的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆