logoalt Hacker News

bityardyesterday at 10:50 PM1 replyview on HN

> but also allowing an attacker to run an offline decryption attack with unlimited attempts. This invariably leads to your main password getting compromised.

Do the OpenSSH authors not know about PKBDF2 or similar?


Replies

degamadtoday at 6:39 AM

How does PBKDF2 prevent an offline decryption attack with unlimited attempts?

All it does is slow down the attempts, but for the average person's easy-to-remember password, it's probably increasing the effort from milliseconds to a few days.