Android sha512 example?

"YOU AND THE ART OF ONLINE DATING" is the only product on the market that will take you step-by-step through the process of online dating, provide you with the resources to help ensure success. Get it now!

Read my post here, especially the post I linked to about password hashing You should ideally use bcrypt or scrypt rather than doing your own password hashing But if you must, you should run for a few thousand iterations at the minimum, preferably more Yes, you can use MessageDigest for SHA-512. Each time you call digest the state of the object automatically resets, which is really handy---you can start updating for the next iteration straight away But I still think you should use bcrypt or scrypt instead. For your own good, and the good of your users.

:-).

Read my post here, especially the post I linked to about password hashing. You should ideally use bcrypt or scrypt rather than doing your own password hashing. But if you must, you should run for a few thousand iterations at the minimum, preferably more.

Yes, you can use MessageDigest for SHA-512. Each time you call digest, the state of the object automatically resets, which is really handy---you can start updating for the next iteration straight away. But I still think you should use bcrypt or scrypt instead.

For your own good, and the good of your users. :-).

– Stuck Jun 18 at 11:32 @Stuck: For Java, I use Damien Miller's implementation, jBCrypt. Damien is the maintainer of portable OpenSSH and I trust his security knowledge. Not sure about Objective-C.

– Chris Jester-Young Jun 18 at 16:27 We will use bcrypt. Thanks! – Stuck Jun 20 at 18:55.

A HMAC is found to be sufficient for what you wanna do and it does only 2 iterations it boils down to hash = sha512(concat(xor(salt,nonce2),sha512(concat(xor(salt,nonce1),pw))).

HMAC is still too fast for password hashing. Please read the article linked to in my post, as to why you need a few thousand iterations. The point is to make the password slow to crack, by making each password trial take a long time (e.g. , a quarter of a second each).

People legitimately logging on the site won't "feel" a quarter of a second; but people cracking passwords will feel those quarter seconds, painfully, as they're trying to attempt a billion passwords. – Chris Jester-Young Jun 18 at 16:24.

I cant really gove you an answer,but what I can give you is a way to a solution, that is you have to find the anglde that you relate to or peaks your interest. A good paper is one that people get drawn into because it reaches them ln some way.As for me WW11 to me, I think of the holocaust and the effect it had on the survivors, their families and those who stood by and did nothing until it was too late.

Related Questions