Quantcast
Viewing all articles
Browse latest Browse all 50

Comment by R.. GitHub STOP HELPING ICE on Is using `crypt` in PostgreSQL for password comparison secure against timing attacks?

The = operator is not constant-time, but I don't see any reason that's relevant in this context. Assuming the attacker does not have access to the salt, knowing how many bytes of the computed hash matched for a candidate password is completely useless.

Viewing all articles
Browse latest Browse all 50

Trending Articles