SHA-256 密码生成器
我看到了 sha-256 的 javascript 实现。 我想问使用 sha-256(使用 javascript 实现或可能是 python 标准模块)算法作为密码生成器是否安全(无论优点/缺点):
我记得一个密码,将其放在后面(等等)网站地址中并使用生成的文本作为该网站的密码。 每次我需要密码时重复该过程 其他网站也一样
i saw a javascript implementation of sha-256.
i waana ask if it is safe (pros/cons wathever) to use sha-256 (using javascript implementation or maybe python standard modules) alogrithm as a password generator:
i remember one password, put it in followed(etc) by the website address and use the generated text as the password for that website.
repeat process every time i need password
same for other websites
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
我认为您正在描述 SuperGenPass 使用的方法:
获取主密码(每个站点都相同),将其与网站的域名,然后散列该东西。
是的,SHA-256 是安全的,可能比使用 SuperGenPass 时更安全。但是,您最终会得到非常长的密码,对于许多网站来说太长而无法接受,并且也不能保证同时包含数字、字母和特殊字符,而某些网站要求这样做。
此外,普遍的问题仍然是,如果您的主密码以某种方式(不是通过破坏算法,而是通过其他方式)泄露,您的所有密码都属于我们。
完全随机的密码是最安全的(如果我们忽略将它们安全地存储在某处的问题)。
I think you are describing the approach used by SuperGenPass:
Take a master password (same for every site), concatenate it with the site's domain name, and then hash the thing.
Yes, SHA-256 would be secure for that, likely more secure than when SuperGenPass uses. However, you will end up with very long passwords, too long for many sites to accept, and also not guaranteed to contain numbers and letters and special characters at the same time, which some sites require.
Also, the general problem remains that if somehow (not by breaking the algorithm, but by other means) your master password does get leaked, all your passwords are belong to us.
Completely random passwords are most secure (if we ignore the problem of storing them securely somewhere).
SHA-256 生成非常长的字符串。您最好将
random.choice()
与字符串一起使用固定次数。SHA-256 generates very long strings. You're better off using
random.choice()
with a string a fixed number of times.