Skip to content

Cryptography introduction: hash algorithm recommendations outdated #59

@felixauringer

Description

@felixauringer

The section about prominent hash algorithms does not include modern password hashing algorithms.

Nowadays, there are hashing algorithms designed explicitly for hashing passwords. Those also have parameters to require more computations and/or memory (which does not scale well) in order to make bruteforce attacks harder. Examples are argon2id and yescrypt (the former won the Password Hashing Competition). You describe password hashing as a use case for cryptographic hashes but only mention algorithms that are not suitable for this purpose.


You also say that MD5 is still useful. However, because of existing attacks (e.g. missing collision resistance), MD5 is obsolete and should not be used at all. For other use cases (not related to password hashing), there are other very fast algorithms without known attacks that should be preferred. Examples are SHA-2 or SHA-3.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions