Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Salted hashes don\'t seem to offer any real protection for user passwords by its

ID: 656747 • Letter: S

Question

Salted hashes don't seem to offer any real protection for user passwords by itself. So long as a hacker has a quick way to check if a password is right or wrong, it's trivial to brute force it to view the plain-text passwords. Especially if the attacker is using GPUs or an FPGA/ASIC solution.

From what I've gathered, I should be sending my hashed+salted passwords to a (hardened) dedicated server on my network whose sole task is validation (via secret keys). A hacker would have to gain access to both servers before plain-text passwords could be retrieved. I like this solution, but I don't like the cost of renting another server.

Are there any alternatives to using a dedicated validation server?

Explanation / Answer

The usual solution is just to enforce passwords that are of a length which makes brute forcing very non-trivial.

Have a look at any of our questions on password strength or entropy and you'll see what password complexity/length is required to make sure even GPU-based brute forcers will fail over a time frame you need.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote