Bernd Wechner on March 17, 2000 at 14:34:32:
Not technical enough
Nice article, but it misses the key point of confusion. If, every time I call encryp:password, it uses another salt, and hence comes up with a different encrypteed password, how on earth can I use it for password protection. I need to be ebalt to encrypt the same password twice, and get a result I can compare, no?
Seems a point worth mentioning, I'm certainly confused, and researching more on the web as a result ...
Other feedback on 'Random and Recursive Crypting using Salt on Unix and Win32' - show all