You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Feb 20, 2025. It is now read-only.
Yes, NIST says the iterations count should be "at least 10 000 iterations" but today many computers are faster and PBKDF2 i vulnerable (right word?) to adversaries using optimized hardware. "ykpamcfg" should use a random iterations count for each run that falls somewhere between 50 000 and 200 000 iterations.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Yes, NIST says the iterations count should be "at least 10 000 iterations" but today many computers are faster and PBKDF2 i vulnerable (right word?) to adversaries using optimized hardware. "ykpamcfg" should use a random iterations count for each run that falls somewhere between 50 000 and 200 000 iterations.
The text was updated successfully, but these errors were encountered: