Or, like the article suggested, a random portion for the hash... I
agree with you, Micah. The hash collision is a problem, and must be
avoided.
Same password hashes for different users are very good candidates for
a dictionary attack. Probably, in most of this cases, users picked
"easy" passwords, like "1234" or "admin".

Cheers

2009/2/9 Micah Gersten <mi...@onshore.com>
>
> onlist this time...
>
> tedd wrote:
>
> > > <snip>
> > >
> > > I think the MD5() hash is a pretty good way and if the weakness is the
> > > user's lack of uniqueness in determining their passwords, then we can
> > > focus on that problem instead of looking to another hash. And besides,
> > > the solution presented was to create a salt and use that -- that's
> > > just another step in the algorithm process not much different than
> > > what I propose.
> > >
> > > Cheers,
> > >
> > > tedd
> > >
> >
>
> The MD5 hash IS the problem.  The problem isn't the uniqueness of the
> passwords, but rather the uniqueness of the hash. The solution is to use
> another hash that does not have the same collision issues.
>
> Thank you,
> Micah Gersten
> onShore Networks
> Internal Developer
> http://www.onshore.com
>
>
>
>
> --
> PHP General Mailing List (http://www.php.net/)
> To unsubscribe, visit: http://www.php.net/unsub.php
>



--
Bruno Fajardo - Desenvolvimento
bruno.faja...@dinamize.com - www.dinamize.com
Dinamize RS - Porto Alegre-RS - CEP 90420-111
Fones (51) 3027 7158 / 8209 4181 - Fax (51) 3027 7150

Dinamize BA - Lauro de Freitas - Fone 71 3379.7830
Dinamize SC - Joinville - Fone 47 3025.1182
Dinamize DF - Asa Norte - Brasília - Fone 61 3274.1172
Dinamize SP - São Paulo - Fone 11 6824.6250
Dinamize PR - Curitiba - Fone 41 3306.4388
Dinamize RS - Caxias do Sul - Fone 54 3533.4333
Dinamize RJ - Rio de Janeiro - Fone 21 2169.6311

--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to