Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>Moreover, you made the security of your system "key"-dependent: what if I generate such "key" that will only use 5 iterations of MD5 and 1 iteration of SHA-1? This would be a major failure. Imagine if the security of AES was not 2^128, but varied between 2^10 to 2^128 depending on what key you supplied -- would you use it?

Agreed. The unpredictability of the work factor would be a problem.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: