Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replace PKCS5_PBKDF2_HMAC_SHA1 with Argon2id #636

Open
ole-tange opened this issue Jul 8, 2021 · 0 comments
Open

Replace PKCS5_PBKDF2_HMAC_SHA1 with Argon2id #636

ole-tange opened this issue Jul 8, 2021 · 0 comments

Comments

@ole-tange
Copy link

ole-tange commented Jul 8, 2021

BitCoin mining shows you can get hardware to do 90 TeraHashes/s (SHA256).

It seems PBKDF2 does in the order of 1 MegaHashes of SHA1. This is not the same as SHA256, but if you can build a machine that does 90 TeraHashes/s of SHA256, it is not unreasonable to assume you can do the same for SHA1.

This means you can test 90000 passwords per second or 2838240000000 passwords per year. This is would brute force a password of 7 chars using a single machine. This is well within the power of any TLA agency.

https://en.wikipedia.org/wiki/Password_Hashing_Competition was made to find an alternative, and Argon2id is today the recommended method to use.

The README of https://github.com/alexedwards/argon2id suggests it is easy to change PKCS5_PBKDF2_HMAC_SHA1 to argon2id.CreateHash.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant