Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: unbruteforceabe hash?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi Folks!

I'm thinking about using a software with the following hash-algorithm: sha1(salt+sha1(salt+pass+salt))

I wanted to check if this algorithm is secure.

As far as I can say, no Bruteforce-Software supports such a algorithm, right? So you would say this method is secure?

thanks!
(04-30-2012, 09:45 PM)matafor Wrote: [ -> ]Hi Folks!

I'm thinking about using a software with the following hash-algorithm: sha1(salt+sha1(salt+pass+salt))

I wanted to check if this algorithm is secure.

As far as I can say, no Bruteforce-Software supports such a algorithm, right? So you would say this method is secure?

thanks!


No. especially since you have just posted this, it would be absolutely trivial to add this algorithm to a bruteforcer (or write your own).

Additionally, even if you don't divulge the combination, that doesn't guarantee someone can't figure it out, one way or another.

It may help to keep the script-kiddies out, but nothing is unbreakable.
a similar algorithm, in fact more secure is already bruteforceable :: sha1($salt.sha1($salt.sha1($pass)))
[Image: Facepalm-Picard-360x360.jpg]


Read up on security through minority.

Then, once you have realized how silly it is to try to reinvent the wheel by out-smartening ones designed by cryptography geniuses;

Look at the preexisting algorithms available for you.

More specifically crypt(sha512) or bcrypt().