commit 79ff93eb7018762eb9820ad04074315d71e57f61 parent 269634a225784fa8a6f563b6b93e260b9ffe3638 Author: Jackson G. Kaindume <seestem@merely.tech> Date: Thu, 18 Aug 2022 13:07:09 +0200 grammar Diffstat:
M | doc/password-hashing.md | | | 4 | ++-- |
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/doc/password-hashing.md b/doc/password-hashing.md @@ -19,8 +19,8 @@ users password with a [__hash function__](https://en.wikipedia.org/wiki/Hash_fun There are lots of hash functions that can be used, but most of these will be a bad idea to use. For example if you use SHA-256 or other -computationally cheap (hash function without a __work factor__ -parameter) functions, they are vulnerable to rainbow table attacks. +computationally cheap functions (hash function without a __work factor__ +parameter), they are vulnerable to rainbow table attacks. Bruteforce is also possible if the password length is short/known, asic miners can generate 100 TeraHashes PER Second.