No description
This repository has been archived on 2025-06-24. You can view files and clone it, but you cannot make any changes to it's state, such as pushing and creating new issues, pull requests or comments.
Find a file
2012-09-02 22:53:50 -07:00
config.aux Import scrypt-1.1.6.tgz with SHA-256 2012-09-02 11:29:39 -07:00
lib Create salt using SHA256 of site name 2012-09-02 22:08:52 -07:00
.gitignore Remove unused encryption/decryption routines from genpass 2012-09-02 19:01:02 -07:00
config.h.in Import scrypt-1.1.6.tgz with SHA-256 2012-09-02 11:29:39 -07:00
configure Import scrypt-1.1.6.tgz with SHA-256 2012-09-02 11:29:39 -07:00
FORMAT Fixed comment in FORMAT file 2012-09-02 20:56:42 -07:00
main.c Add -p option and fixed memory bug 2012-09-02 22:53:50 -07:00
Makefile.in Remove fraction of total memory as a command line opt 2012-09-02 20:10:20 -07:00
README.md Initial commit consists of a README.md and .gitignore 2012-09-02 11:26:03 -07:00
scrypt.1 Import scrypt-1.1.6.tgz with SHA-256 2012-09-02 11:29:39 -07:00
scrypt_platform.h Import scrypt-1.1.6.tgz with SHA-256 2012-09-02 11:29:39 -07:00

There are a number of password generators such as SuperGenPass, PwdHash, etc. that generate a site-specific password from a master password and the site's URL. An attacker who obtains your site-specific password and the site's URL could attempt to determine your master password by brute-force. Typically, these password generators work by simply concatenating your master password with the site's URL and computing a cryptographic (SHA1 or MD5) hash. These hashes were designed such that they could be calculated very quickly, which the opposite of what we want. A more secure method would be to use PBKDF2 or bcrypt or Colin Percival's new scrypt algorithm, which would make a brute-force attack many orders of magnitude more difficult.

This project uses Colin Percival's scrypt as a password generator.

For more details of how scrypt works, see

http://www.tarsnap.com/scrypt.html