Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Known exploits #186

Open
rurban opened this issue Mar 30, 2021 · 3 comments
Open

Known exploits #186

rurban opened this issue Mar 30, 2021 · 3 comments
Assignees

Comments

@rurban
Copy link
Owner

rurban commented Mar 30, 2021

So far we didn't list the known exploit schemes. But since I started evaluating and listing Bad Seeds #99, we could as well list all known exploits, e.g. BadKeys which will always lead to collisions.

@rurban rurban self-assigned this Apr 2, 2021
@rurban
Copy link
Owner Author

rurban commented Jul 23, 2021

@flyingmutant
Copy link

@wangyi-fudan
Copy link
Contributor

In fact I dont't buy the BadSeeds test as it "invades hasher's personal space". The BadSeeds test make use of hasher's default internal secrets. It is like: "I use (public) password of your public account and I found you have only 100 dollars left and I announce that to the media saying you are a poor man". The fact is that I have 2^32 "accounts" each of which has 100 dollars :-D
But I don't want to involve too much to the this problem as wyhash is almost complete and there are more important things to do. So usually I keep calm and satisfied with the nominal "second place" in the speed list :-D
To your problem this WYHASH_CONDOM protects for entropy loss but not password lost.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants