this post was submitted on 18 Aug 2024
830 points (98.8% liked)

Cybersecurity - Memes

1891 readers
2 users here now

Only the hottest memes in Cybersecurity

founded 1 year ago
MODERATORS
830
submitted 3 weeks ago* (last edited 3 weeks ago) by cron to c/cybersecuritymemes@lemmy.world
 

Last week, I tried to register for a service and was really surprised by a password limit of 16 characters. Why on earth yould you impose such strict limits? Never heard of correct horse battery staple?

you are viewing a single comment's thread
view the rest of the comments
[–] wer2@lemm.ee 15 points 3 weeks ago (1 children)

It doesn't matter the input size, it hashes down to the same length. It does increase the CPU time, but not the storage space. If the hashing is done on the client side (pre-transmission), then the server has no extra cost.

For example, the hash of a Linux ISO isn't 10 pages long. If you SHA-256 something, it always results in 256 bits of output.

On the other hand, base 64-ing something does get longer as the input grows.

[–] redxef@scribe.disroot.org 3 points 3 weeks ago (2 children)

Hashing on the client side is as secure as not hashing at all, an attacker can just send the hashes, since they control the client code.

[–] DaPorkchop_@lemmy.ml 3 points 3 weeks ago

Then you can salt+hash it again on the server.

[–] wer2@lemm.ee 2 points 3 weeks ago (1 children)

Hashing is more about obscuring the password if the database gets compromised. I guess they could send 2^256 or 2^512 passwords guesses, but at that point you probably have bigger issues.

[–] redxef@scribe.disroot.org 2 points 3 weeks ago* (last edited 3 weeks ago)

It's more about when a database gets leaked. They then don't even have to put in the effort of trying to match hashes to passwords. And that's what hashing a password protects against, when done correctly.