Difference between SSHA512 and SHA512
Clash Royale CLAN TAG#URR8PPP
up vote
2
down vote
favorite
I am using SSHA512 to encrypt email user's passwords. Manually doing this works using doveadm from dovecot. But I can't seem to implement this in my mail client. I can, however, use SHA512.
Is SHA512 less secure than SSHA512?
passwords password-hashing
New contributor
add a comment |Â
up vote
2
down vote
favorite
I am using SSHA512 to encrypt email user's passwords. Manually doing this works using doveadm from dovecot. But I can't seem to implement this in my mail client. I can, however, use SHA512.
Is SHA512 less secure than SSHA512?
passwords password-hashing
New contributor
After a quick search I found this code which shows you how not to implement the SSHA-512 algorithm in Java, but if you have any issues implementing it you can always ask on StackOverflow.
â Maarten Bodewes
23 mins ago
add a comment |Â
up vote
2
down vote
favorite
up vote
2
down vote
favorite
I am using SSHA512 to encrypt email user's passwords. Manually doing this works using doveadm from dovecot. But I can't seem to implement this in my mail client. I can, however, use SHA512.
Is SHA512 less secure than SSHA512?
passwords password-hashing
New contributor
I am using SSHA512 to encrypt email user's passwords. Manually doing this works using doveadm from dovecot. But I can't seem to implement this in my mail client. I can, however, use SHA512.
Is SHA512 less secure than SSHA512?
passwords password-hashing
passwords password-hashing
New contributor
New contributor
edited 31 mins ago
Gilles
7,28532549
7,28532549
New contributor
asked 3 hours ago
Cliff Crerar
112
112
New contributor
New contributor
After a quick search I found this code which shows you how not to implement the SSHA-512 algorithm in Java, but if you have any issues implementing it you can always ask on StackOverflow.
â Maarten Bodewes
23 mins ago
add a comment |Â
After a quick search I found this code which shows you how not to implement the SSHA-512 algorithm in Java, but if you have any issues implementing it you can always ask on StackOverflow.
â Maarten Bodewes
23 mins ago
After a quick search I found this code which shows you how not to implement the SSHA-512 algorithm in Java, but if you have any issues implementing it you can always ask on StackOverflow.
â Maarten Bodewes
23 mins ago
After a quick search I found this code which shows you how not to implement the SSHA-512 algorithm in Java, but if you have any issues implementing it you can always ask on StackOverflow.
â Maarten Bodewes
23 mins ago
add a comment |Â
1 Answer
1
active
oldest
votes
up vote
3
down vote
Is SHA512 less secure than SSHA512?
Hashing passwords plainly with SHA512 is indeed less secure than using SSHA512. But note that this doesn't imply that using SSHA512 is actually a good / secure method for hashing your passwords.
The reason for the inequality is simple:
$$operatornameSSHA512(textpw,textsalt)=operatornameSHA512(textpwparallel textsalt)parallel textsalt$$
So as you can see it's a case of a single iteration of SHA-512 paired with some basic salting. Salting is a good thing as it (among other things) thwarts rainbow-tables but of course a modern GPU (like the Tesla V100 or with nearly the same speed the RTX 2080 Ti) achieves about 1.8GH/s per card. That is $1.8cdot 10^9$ SHA512 evaluations per second and per card. Also note that for about 25 USD/hr you can rent 8 of these on AWS which gives you about 2.1 TH/USD, that is an attacker can try about $2 000 000 000 000$ password hashes for a single US-Dollar. So if the user has any even remotely weak password, it's a matter of a few USD to break it.
The more modern approach is then to use Argon2 or bcrypt instead which perform much worse on GPUs.
add a comment |Â
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
3
down vote
Is SHA512 less secure than SSHA512?
Hashing passwords plainly with SHA512 is indeed less secure than using SSHA512. But note that this doesn't imply that using SSHA512 is actually a good / secure method for hashing your passwords.
The reason for the inequality is simple:
$$operatornameSSHA512(textpw,textsalt)=operatornameSHA512(textpwparallel textsalt)parallel textsalt$$
So as you can see it's a case of a single iteration of SHA-512 paired with some basic salting. Salting is a good thing as it (among other things) thwarts rainbow-tables but of course a modern GPU (like the Tesla V100 or with nearly the same speed the RTX 2080 Ti) achieves about 1.8GH/s per card. That is $1.8cdot 10^9$ SHA512 evaluations per second and per card. Also note that for about 25 USD/hr you can rent 8 of these on AWS which gives you about 2.1 TH/USD, that is an attacker can try about $2 000 000 000 000$ password hashes for a single US-Dollar. So if the user has any even remotely weak password, it's a matter of a few USD to break it.
The more modern approach is then to use Argon2 or bcrypt instead which perform much worse on GPUs.
add a comment |Â
up vote
3
down vote
Is SHA512 less secure than SSHA512?
Hashing passwords plainly with SHA512 is indeed less secure than using SSHA512. But note that this doesn't imply that using SSHA512 is actually a good / secure method for hashing your passwords.
The reason for the inequality is simple:
$$operatornameSSHA512(textpw,textsalt)=operatornameSHA512(textpwparallel textsalt)parallel textsalt$$
So as you can see it's a case of a single iteration of SHA-512 paired with some basic salting. Salting is a good thing as it (among other things) thwarts rainbow-tables but of course a modern GPU (like the Tesla V100 or with nearly the same speed the RTX 2080 Ti) achieves about 1.8GH/s per card. That is $1.8cdot 10^9$ SHA512 evaluations per second and per card. Also note that for about 25 USD/hr you can rent 8 of these on AWS which gives you about 2.1 TH/USD, that is an attacker can try about $2 000 000 000 000$ password hashes for a single US-Dollar. So if the user has any even remotely weak password, it's a matter of a few USD to break it.
The more modern approach is then to use Argon2 or bcrypt instead which perform much worse on GPUs.
add a comment |Â
up vote
3
down vote
up vote
3
down vote
Is SHA512 less secure than SSHA512?
Hashing passwords plainly with SHA512 is indeed less secure than using SSHA512. But note that this doesn't imply that using SSHA512 is actually a good / secure method for hashing your passwords.
The reason for the inequality is simple:
$$operatornameSSHA512(textpw,textsalt)=operatornameSHA512(textpwparallel textsalt)parallel textsalt$$
So as you can see it's a case of a single iteration of SHA-512 paired with some basic salting. Salting is a good thing as it (among other things) thwarts rainbow-tables but of course a modern GPU (like the Tesla V100 or with nearly the same speed the RTX 2080 Ti) achieves about 1.8GH/s per card. That is $1.8cdot 10^9$ SHA512 evaluations per second and per card. Also note that for about 25 USD/hr you can rent 8 of these on AWS which gives you about 2.1 TH/USD, that is an attacker can try about $2 000 000 000 000$ password hashes for a single US-Dollar. So if the user has any even remotely weak password, it's a matter of a few USD to break it.
The more modern approach is then to use Argon2 or bcrypt instead which perform much worse on GPUs.
Is SHA512 less secure than SSHA512?
Hashing passwords plainly with SHA512 is indeed less secure than using SSHA512. But note that this doesn't imply that using SSHA512 is actually a good / secure method for hashing your passwords.
The reason for the inequality is simple:
$$operatornameSSHA512(textpw,textsalt)=operatornameSHA512(textpwparallel textsalt)parallel textsalt$$
So as you can see it's a case of a single iteration of SHA-512 paired with some basic salting. Salting is a good thing as it (among other things) thwarts rainbow-tables but of course a modern GPU (like the Tesla V100 or with nearly the same speed the RTX 2080 Ti) achieves about 1.8GH/s per card. That is $1.8cdot 10^9$ SHA512 evaluations per second and per card. Also note that for about 25 USD/hr you can rent 8 of these on AWS which gives you about 2.1 TH/USD, that is an attacker can try about $2 000 000 000 000$ password hashes for a single US-Dollar. So if the user has any even remotely weak password, it's a matter of a few USD to break it.
The more modern approach is then to use Argon2 or bcrypt instead which perform much worse on GPUs.
answered 3 hours ago
SEJPMâ¦
27.4k451130
27.4k451130
add a comment |Â
add a comment |Â
Cliff Crerar is a new contributor. Be nice, and check out our Code of Conduct.
Cliff Crerar is a new contributor. Be nice, and check out our Code of Conduct.
Cliff Crerar is a new contributor. Be nice, and check out our Code of Conduct.
Cliff Crerar is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f63515%2fdifference-between-ssha512-and-sha512%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
After a quick search I found this code which shows you how not to implement the SSHA-512 algorithm in Java, but if you have any issues implementing it you can always ask on StackOverflow.
â Maarten Bodewes
23 mins ago