Displaying 1 result from an estimated 1 matches for "saltless".
Did you mean:
faultless
2017 Jul 16
1
SQLite user database
...-CRYPT} does compared with {SHA512}. It is
normal to get a different hash with the same password when you regenerate
the hash because a different random salt was chosen (the part between the
'$6$' and the next '$') -- it used as part of the hash computation.
{SHA512} is a straight saltless hash -- the same password maps to the
same hash. This makes it prone to dictionary attacks (i.e. pre-generated
tables of plaintext/hash values).
If you support both schemes, SHA512-CRYPT is much stronger.
Joseph Tam <jtam.home at gmail.com>