Slide 17
Slide 17 text
That’s theory, what
about tangible “stuff”?
1. Don’t overdo your length. It can lead to a DOS.
(*)
2. Use an adaptive one-way function (PBKDF2,
bcrypt, Argon2, etc.) with a cost-factor (“time
delay”).
3. Use keyed functions like HMAC, etc. in
conjunction with (2).
4. Never store plaintext passwords (evidently).
5. The key for HMAC should be treated like a
private key; don’t store it in your database.