re: A Simple Password Hash implementation VIEW POST

TOP OF THREAD FULL DISCUSSION
re: Violation of rule #1 of cryptography: Never ever invent your own crypto algorithm. Crypto is difficult, really difficult. Hashcat can do 25Giga-...
 

Thanks for your feedback. However, if you read through the article, you would have observed that I stated clearly the intent.

This article does not aim to provide a better solution to the ones already provided by the existing libraries, rather it tends to shed some light on how the implementation works under the hood.

Also, before the Conclusion, there's a disclaimer

Disclaimer: This article does not guarantee the security of encryption implemented herein.

I hope this helps explain better.

code of conduct - report abuse