Both links may be really helpful to gauge the hashes used for an skey
system, theoretically. So thank you for providing them.
But sadly, if I didn't miss anything, they do not describe the real
life circumstances needed for some successful attack on the skey
hashes. For example how much time is n
> On Jan 11, 2020, at 3:24 PM, Anders Andersson wrote:
>
> While perusing the OpenBSD FAQ I came across the S/Key login system
> and noticed that there are three possible hashing algorithms to choose
> from: MD5, SHA1, and RIPEMD-160.
>
> Instinctively I wouldn't want to use any of these. RI
While perusing the OpenBSD FAQ I came across the S/Key login system
and noticed that there are three possible hashing algorithms to choose
from: MD5, SHA1, and RIPEMD-160.
Instinctively I wouldn't want to use any of these. RIPEMD-160 seems
like the only one that hasn't been broken, but that's prob
3 matches
Mail list logo