On Thu 05.06.2014 at 12:55:06PM -0400, Kevin Cox wrote:
> On 05/06/14 12:28, Santiago Borrazás wrote:
> > 
> > What do you think about storing password with this approach?
> 
> Disclaimer: I am not a cryptographer.

Neither am I.
 
> If you assume that your hash function is a random oracle and nobody
> knows your "master" password then it should be perfectly secure.

The program uses bcrypt, which has been designed to be very slow to run
and makes brute-force attack (even against dictionaries) impractical
(especiall on GPUs, by design of the algorithm). From this point of
view, bcrypt is much safer for hashing passwords than usual hashing
algorithms (e.g., SHA1) which have been designed to be fast to run
(especially on GPUs).
 
> However, if an attacker gains access to a single password they can work
> out your master password especially if it is weak.  (They can brute
> force it, so if the entropy is high enough this should be impractical)

If the master password is long enough, it is safe.

Matthieu
-- 
 (~._.~)            Matthieu Weber - [email protected]              (~._.~)
  ( ? )                http://weber.fi.eu.org/                    ( ? ) 
 ()- -()          public key id : 0x85CB340EFCD5E0B3             ()- -()
 (_)-(_) "Humor ist, wenn man trotzdem lacht (Otto J. Bierbaum)" (_)-(_)

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Password-Store mailing list
[email protected]
http://lists.zx2c4.com/mailman/listinfo/password-store

Reply via email to