Hacker News new | past | comments | ask | show | jobs | submit login

Regarding requiring users to log in; wouldn't it be better to run their current hash through another password hashing scheme (while we're at it bcrypt, scrypt, PBKDF, etc)? Then, the next time they log in, verify them by running their password through the old algorithm, and the result through the new one.



That could be a good transition strategy if you're worried about being compromised before all your users have logged in again, but you would still want to move them over to using just the new system when they do. It probably would be fine, but when it comes to crypto you don't take chances when you don't have to.


Yep. Here is a treatment of that: https://gist.github.com/1051238




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: