This is really good for encrypted content such as a hard drive, password vault or gpg key

  • kevincox
    link
    fedilink
    arrow-up
    2
    ·
    5 months ago

    It depends a lot on the hash functions. Lots of hashes are believed to be difficult to parallelize on GPUs and memory hard hash functions have different scaling properties. But even then you need to assume that an adversary has lots of computing power and a decent amount of time. These can all be estimated then you give yourself a wide margin.