Skip to content

Instantly share code, notes, and snippets.


Taylor Hornby defuse

View GitHub Profile
veorq /
Last active Dec 20, 2015
Simple password hash
This is an EXPERIMENTAL password hash with time and memory parameters,
such that the time parameter does not affect the memory required (but
does affect the number of memory accesses).
This was quickly designed, with no real test, so it's probably a silly
design and the code may be broken. Therefore, please:
- Do not use it to hash real passwords!
- Attack it! (circumvent the time/memory requirements, find biases...)