Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 4 Aug 2009 18:19:32 +0100
From:      RW <rwmaillists@googlemail.com>
To:        freebsd-questions@freebsd.org
Subject:   Re: Secure password generation...blasphemy!
Message-ID:  <20090804181932.35562195@gumby.homeunix.com>
In-Reply-To: <64c038660908040942t6f7934detdeb7b138623eb884@mail.gmail.com>
References:  <64c038660908031928v15a76d15g5599e6f3fef936e1@mail.gmail.com> <200908032220.50964.mel.flynn%2Bfbsd.questions@mailing.thruhere.net> <20090804173939.598a224f@gumby.homeunix.com> <64c038660908040942t6f7934detdeb7b138623eb884@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 4 Aug 2009 10:42:22 -0600
Modulok <modulok@gmail.com> wrote:

> As I understand it I would have to double the length of a hashed
> password for it to be as secure as an un-hashed one, as each pair of
> characters represent one byte. Aye?

I wouldn't put it quite like that, it's the hexadecimal representation
that puts one bytes into two characters not the hashing.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090804181932.35562195>