Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
sp332
on Aug 15, 2014
|
parent
|
context
|
favorite
| on:
Project Euler Returns
An attacker can pre-compute hashes of common passwords for common settings of bcrypt/scrypt. With a salt, they have to start from scratch every time.
jgeralnik
on Aug 15, 2014
|
next
[–]
bcrypt and scrypt are always salted (it's part of their algorithms - there is not such thing as unsalted bcrypt/scrypt)
stouset
on Aug 15, 2014
|
prev
[–]
No. No, they cannot.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: