Forums
Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length

Author Topic: Speed of encryption  (Read 14196 times)

0 Members and 1 Guest are viewing this topic.

Offline PH-ZTaylor

  • FraudRecord Member
  • *
  • Posts: 2
Speed of encryption
« on: August 25, 2012, 02:09:55 PM »
I was wondering, instead of using thousands upon thousands of SHA1() rounds, why not use a different cipher method that is more resistant to cryptanalysis attacks, and less computationally expensive, such as whirlpool.

Offline harzem

  • Administrator
  • *****
  • Posts: 82
Re: Speed of encryption
« Reply #1 on: August 25, 2012, 02:23:56 PM »
The repetition is not related to being resistant against cryptanalysis attacks. The repetition is aiming to make rainbow tables or brute force attacks infeasible. Being "computationally expensive" was the main purpose here. We benchmarked some servers to determine an acceptable speed. If today's servers were faster, we would use 128,000 rounds instead of 32,000 to make it even more computationally expensive.

One other consideration was the availability of SHA1 on most server applications, including PHP.

Offline PH-ZTaylor

  • FraudRecord Member
  • *
  • Posts: 2
Re: Speed of encryption
« Reply #2 on: August 25, 2012, 02:49:51 PM »
I thought that the brute force attack feasibility was based upon the length of the hash secret, as opposed to the repetition.  In this case, http://www.fraudrecord.com/security.php gives us the secret, which definitely decreases the time it would take to bruteforce, as the secret is known.

Offline harzem

  • Administrator
  • *****
  • Posts: 82
Re: Speed of encryption
« Reply #3 on: August 25, 2012, 03:13:48 PM »
There is no "hash secret". Hashing is not done via an encryption key. There is no way to include any secrecy in a system like this. There is a salt, specifically "fraudrecord-", but it is impossible to use a secret salt. It must be universal across all the companies, modules and codes using FraudRecord.

The only way to increase strength is increasing the number of repetition, regardless of the salt or hashing algorithm. We took the best course of action available.

 

April 19, 2024, 08:37:11 AM: Page created in 0.074 seconds with 23 queries by SMF