cryptography - Timing attacks on password hashes
security.stackexchange.com·4d
🔐Cryptography
Preview
Report Post

Permitting the hash to leak via a timing attack changes the available defenses. Online guessing attacks are fundamentally slower (go too fast and it’s indistinguishable from a DoS), which practically limits their guessing rate. Allowing the hash to leak via a timing attack means the attacker can perform an offline guessing attack.

I agree in principle with the preceding answer that with a sufficiently large random salt which isn’t leaked (say, 100 bits or so), offline attacks against the hash become infeasible.

However, I prefer in principle to encourage never leaking user password verifiers. Attacks only get better; why let the attacker have data which it is trivial to keep from them by using a standard constant time comparison?

Also, it saves the bother of checking if your salt is lon…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help