From: | "Marko Kreen" <markokr(at)gmail(dot)com> |
---|---|
To: | "Brian Mathis" <brian(dot)mathis(at)gmail(dot)com> |
Cc: | "Tino Wildenhain" <tino(at)wildenhain(dot)de>, "Ranieri Mazili" <ranieri(dot)oliveira(at)terra(dot)com(dot)br>, pgsql-general(at)postgresql(dot)org, pgsql-sql(at)postgresql(dot)org |
Subject: | Re: Encrypted column |
Date: | 2007-06-05 15:09:43 |
Message-ID: | e51f66da0706050809r3da6c61eqf8e6f73ae8a1cc82@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general pgsql-sql |
On 6/5/07, Marko Kreen <markokr(at)gmail(dot)com> wrote:
> both md5 and sha1 are actually easier to bruteforce than
> the old DES-based crypt.
If this statement seems weird - the problem is the speed.
MD5 and SHA1 are just faster algorithms than des-crypt.
And there's nothing wrong with fast general-purpose algorithms,
as long their cryptographic properties hold. Starting from
20-30 bytes the bruteforce is really not an option.
But if you have under 10 bytes (let be honest - you have
6 bytes...) the speed start to matter, because it is possible
on random laptop to simply try all combinations.
--
marko
From | Date | Subject | |
---|---|---|---|
Next Message | Scott Marlowe | 2007-06-05 15:10:10 | Re: Foreign keys and indexes |
Previous Message | Marc Compte | 2007-06-05 15:07:50 | Re: Foreign keys and indexes |
From | Date | Subject | |
---|---|---|---|
Next Message | Brian Mathis | 2007-06-05 15:22:04 | Re: Encrypted column |
Previous Message | Oliveiros Cristina | 2007-06-05 15:00:27 | Re: [SQL] JOIN |