Long passwords are good, but too much length can be a DoS hazard

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
For more than a year, Ars has advised readers to use long, randomly generated passwords to protect their digital assets. Now comes definitive proof that too much password length can be detrimental to security.

It comes in the form of just-patched vulnerability in the Django Web development framework. By default, it uses the PBKDF2 algorithm to transform plain-text passwords into long strings called cryptographic hashes. Like scrypt and bcrypt, it's one of the most secure ways websites can store "at rest" passwords, because it passes them through multiple hashing rounds that significantly increase the time and computational resources required. In the event of a breach that spills a large password database, the additional effort can literally add centuries to the process of cracking the raw passwords.
Long passwords are good, but too much length can be a DoS hazard | Ars Technica
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top