[DragonFlyBSD - Bug #2427] SHA3/Password Hash
Robin Carey via Redmine
bugtracker-admin at leaf.dragonflybsd.org
Wed Oct 3 01:46:51 PDT 2012
Issue #2427 has been reported by Robin Carey.
Bug #2427: SHA3/Password Hash
Author: Robin Carey
Dear DragonFlyBSD bugs,
I just learned this morning that NIST has completed their competition for
the new SHA3
cryptographic hash algorithm:
I would recommend that DragonFlyBSD consider deprecating SHA2 for password
hashes, and adopting the new SHA3 algorithm/standard (since SHA1 has been
broken and SHA2 is very similar to SHA1; but note that I bbelieve SHA2 is
Another reason why:
Go to www.slashdot.org and search for "openwall" or "John the Ripper" to
see article on:
"John the Ripper Cracks Slow Hashes On
Basically, even SHA512 was considered problematic in the above article
on cracking password hashes (presumably by brute force).
Robin Carey BSc
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: http://bugs.dragonflybsd.org/my/account
More information about the Bugs