Yes, thanks for the refresher.  ;-)

But as I said, for non-crypto requirements weak data (or password) 
obfuscation can be sufficient.
For such weak purposes an FNV-1 code 3-liner may be adequate.

For comparison: The Argon-2 github shows about 2000 lines of C code.


Am Montag, 7. Januar 2019 16:28:21 UTC+1 schrieb Sam Whited:
>
> On Mon, Jan 7, 2019, at 07:58, minf...@arcor.de <javascript:> wrote: 
> > I've often encountered demands for password encryption, where simple 
> string 
> > hashing would suffice. 
>
> You should never encrypt passwords; encryption implies that you can get 
> the original password back out, it's a two way street. 
> Some form of hashing is always what you want (of course, you can't just 
> hash and call it a day; there's still more work to do). 
>
> > Speed-wise FNV-1a is barely to beat. Add some magic number to the 
> > result and you are good enough. 
> > The algo fits in a single handful of lines. 
>
> You also don't want speed when hashing passwords, this is why all the 
> methods other people have been listing (I use Argon2 or PBKDF.2 depending 
> on the application, personally) are actually a type of hash called a 
> Key-derivation function (KDF).  FNV-1 is not a cryptographic hash function 
> and is not suitable for password storage. 
>
> OWASP has a good overview of password storage if you're interested: 
> https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet 
>
> —Sam 
>

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to