Could you flesh this out? I’m not familiar with key-stretching.
A pretty critical point is whether or not the hashed value is algorithmically random. The depth measure has the advantage of picking over all permissible starting conditions without having to run through each one. So it’s not exactly analogous to a brute force attack. So for the moment I’m not convinced on this argument.
Could you flesh this out? I’m not familiar with key-stretching.
A pretty critical point is whether or not the hashed value is algorithmically random. The depth measure has the advantage of picking over all permissible starting conditions without having to run through each one. So it’s not exactly analogous to a brute force attack. So for the moment I’m not convinced on this argument.