Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider different password hashing algorithms #3

Open
tarkatronic opened this issue Feb 9, 2021 · 1 comment
Open

Consider different password hashing algorithms #3

tarkatronic opened this issue Feb 9, 2021 · 1 comment

Comments

@tarkatronic
Copy link
Member

The first hashing algorithm I introduced was PBKDF2. This is a good accepted standard. But nowadays there are others that may be better.

Argon2 for example claims to be ASIC and GPU resistant.
BLAKE3 and its predecessor BLAKE2 claim to be massively faster, although I'm uncertain of its security profile.

If we adopt a spec similar to what is propose in Facet-MUD-Project/facetjs#36 we could easily experiment with multiple different algorithms. I think this would be interesting. We could have "required" algorithms, as well as "optional" algorithms. And the implementations should be able to detect the algorithm used and encode/decode appropriately.

@tarkatronic
Copy link
Member Author

No on Blake. In this case, fast is bad. Bcrypt, argon2id, scrypt, and pbkdf2 are the current recommendations.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant