I am currently using SHA256 with a salt to hash my passwords. Is it better to continue using SHA256 or should I change to SHA512?
Intel processors allow to calculate SHA512 faster because of SIMD optimizations they have. I want to take advantage of it in Ruby. However, implementation of SHA512 doesn't use SIMD https://github.com/ruby/ruby/blob/trunk/ext/digest/sha2/sha2.c does it?
Is there any way to unitize SIMD optimizations for calculating SHA512 in Ruby?
I am building a social media application and I would like some help encoding a password string to SHA512 in Swift. I found the CryptoSwift library on GitHub but I am having a hard time loading it into my Swift project and linking it to my project files. Does anyone know how to accomplish this relatively easily?Thanks in advance, Kyle
From How long to brute force a salted SHA-512 hash? (salt provided), to break SHA-512 with brute force strategy, it require 3,17 * 10^64 years. It is almost impossible to decryt it.
But I wonder the situation. If SHA-512 is powerful as the above link, everyone uses SHA-512 and keeps their private key secure then everything is safe and no one can decrypt any information.
On the other hand, I heard it only requires few years to decryt message with the most advanced technology because of computational power. I am confused about the whole picture. What I missed?
I've been investigating a bit about Java String encryption techniques and unfortunately I haven't find any good tutorial for SHA-512; I read a few blogs about MD5 and Base64, but they are not as secure as I'd like to (actually, Base64 is not an encryption technique), so I prefer SHA-512.