Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you've slowed somebody down to brute forcing only 1.5 billion hashes in 6 months by using bcrypt, you have been overwhelmingly successfull.

This system here can brute force 180 billion MD5 hashes per second:

http://www.zdnet.com/25-gpus-devour-password-hashes-at-up-to...

[edit] If you only allow passwords to contain upper/lower case letters and numbers, at 1.5 billion MD5 hashes per 6 months, it would take 19 years to check up to and including 6 character long passwords. And because it's bcrypt, and each password has a different salt, you need to do that for each user; you can't build up a raintable as you go.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: