I currently use SHA512 with per user random salt to hash user passwords and store them in a database. I thought this was pretty secure until I read this article about the use of cheap GPU's to brute force attack passwords.
As an alternative to changing over to bcrypt would it improve security to simply use the SHA512 multiple times? Running it say 100 or 1000 times on its own output to slow down the process and make it that much harder to brute force? Or does iteration of SHA512 actually yield no security benefit?
Iteration technique is well known and effective in hashing especially against Rainbow tables. Classes like Rfc2898DeriveBytes use up to 10K iterations to derive proper passwords. Iterating the hash makes it more difficult to brute force back to the original string since it would be needed to store multiple iterations of strings to be able to crack them which whould mean massive amounts of data with larger hashes (i.e. SHA512).
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With