Making the High Security of Repeated Hashing Practical
sep 28,
2016
Last week I explained how repeated hashing works. Our user Alice can prove that she knows her secret without exposing that secret, and the server can verify this without knowing what her secret is. The follow-up question is – how to make it practical? My explanation last week told you how repeated hashing works, but […]
We Need Something Better Than Passwords, And We Already Have It
sep 20,
2016
A technology called repeated hashing provides user authentication that can only be defeated by guessing the user’s secret or traveling back in time. Since the second is impossible, this is as good as user authentication security can get. Hashing, Again and Again In Learning Tree’s System and Network Security Introduction course we explain hash functions. […]