A fascinating article:
http://arstechnica.com/security/2012/08/passwords-under-assault/
I especially like the depth they went into the algorithms and the rig they built on the first page w/ the 8 7970's. There were several lessons from that article:
- As much as possible, don't use the same password across multiple sites
- Salt your hashed entries
- Use an appropriate hash function
The accessibility of multi-teraflop hardware to the masses seems like a tilt back to computation from space usage.
http://arstechnica.com/security/2012/08/passwords-under-assault/
I especially like the depth they went into the algorithms and the rig they built on the first page w/ the 8 7970's. There were several lessons from that article:
- As much as possible, don't use the same password across multiple sites
- Salt your hashed entries
- Use an appropriate hash function
The accessibility of multi-teraflop hardware to the masses seems like a tilt back to computation from space usage.