Tim Shepard wrote:
I was trying to point out that the HBA scheme seems to allow you these three choices (if I understand it correctly):
user work factor attacker work factor ---------------- -------------------- 1 2^59 2^16 2^75 2^32 2^91
and it's not clear that any of those are useful.
Because?
If security is not needed, then perhaps we don't even need to use the HBA scheme. If security is needed, then perhaps this scheme isn't much better than using some public key cryptography.
We know that security is needed. full stop.
Erik