Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Even without the key the system is still vulnerable to frequency analysis. For example if it were used to store passwords an simple sort and count would reveal accounts that have common passwords which could then be brute forced using lists of the most common passwords found on the internet.

I would hope, very strongly, that nobody would encrypt passwords, but instead, hash them: https://paragonie.com/blog/2016/02/how-safely-store-password...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: