Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

From Australia’s Guidelines for Cryptography:

For most purposes, a hashing algorithm with an output size of 224 bits provides 112 bits of effective security strength, with larger output sizes providing more bits of effective security stre… Continue reading Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

Why are obsurantist approaches to improving password hashing security ineffective? [closed]

For websites that have nothing of value nor any personal data, that only have emails and hashed passwords, the only motivation for attackers (except those who just want to be locally disruptive) is to break passwords that people might reus… Continue reading Why are obsurantist approaches to improving password hashing security ineffective? [closed]

Encryption password in program, to secure its centrally-stored settings?

I was thinking of implementing this in software, starting with one password, with each new release being derived from that initial password.
(trying to find the name of this technique, I think it’s called a “hash chain”)
That way you can g… Continue reading Encryption password in program, to secure its centrally-stored settings?

Why do best practices recommend against adding your own pepper to passwords before hashing?

According to my research, if you want to store passwords securely, you should use built-in hash functions that have been vetted by the professionals. Best practices recommend that you do not add a hard-coded pepper.
But why not?
Let’s say:… Continue reading Why do best practices recommend against adding your own pepper to passwords before hashing?