Here is the text of the NIST sp800-63b Digital Identity Guidelines.

  • escapesamsara@lemmings.world
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    2
    ·
    2 days ago

    Then you’re vulnerable to simple brute force attacks, which if paired with a dumped hash table, can severely cut the time it takes to solve the hash and reveal all passwords.