Explore chapters and articles related to this topic
Energy-efficient distributed password hash computation on heterogeneous embedded system
Published in Automatika, 2022
Branimir Pervan, Josip Knezović, Emanuel Guberović
With the recent increase in computational power that attackers have at their disposal to conduct brute force attacks, the overall password strength needs to increase as well. In addition, bcrypt parameterizes the hash computation complexity with the cost parameter, which enables adjusting the space and compute complexity of the algorithm to match the increased performance of new hardware.