Object
If you want a stronger hashing algorithm, but would prefer not to use BCrypt, SCrypt is another option. SCrypt is newer and less popular (and so less-tested), but it's designed specifically to avoid a theoretical hardware attack against BCrypt. Just as with BCrypt, you are sacrificing performance relative to SHA2 algorithms, but the increased security may well be worth it. (That performance sacrifice is the exact reason it's much, much harder for an attacker to brute-force your paswords). Decided SCrypt is for you? Just install the bcrypt gem:
gem install scrypt
Tell acts_as_authentic to use it:
acts_as_authentic do |c| c.crypto_provider = Authlogic::CryptoProviders::SCrypt end
Creates an SCrypt hash for the password passed.
# File lib/authlogic/crypto_providers/scrypt.rb, line 54 def encrypt(*tokens) ::SCrypt::Password.create(join_tokens(tokens), :key_len => key_len, :salt_size => salt_size, :max_mem => max_mem, :max_memfrac => max_memfrac, :max_time => max_time) end
Key length - length in bytes of generated key, from 16 to 512.
# File lib/authlogic/crypto_providers/scrypt.rb, line 29 def key_len @key_len ||= DEFAULTS[:key_len] end
Does the hash match the tokens? Uses the same tokens that were used to encrypt.
# File lib/authlogic/crypto_providers/scrypt.rb, line 59 def matches?(hash, *tokens) hash = new_from_hash(hash) return false if hash.blank? hash == join_tokens(tokens) end
Max memory - maximum memory usage. The minimum is always 1MB
# File lib/authlogic/crypto_providers/scrypt.rb, line 44 def max_mem @max_mem ||= DEFAULTS[:max_mem] end
Max memory fraction - maximum memory out of all available. Always greater than zero and <= 0.5.
# File lib/authlogic/crypto_providers/scrypt.rb, line 49 def max_memfrac @max_memfrac ||= DEFAULTS[:max_memfrac] end
Generated with the Darkfish Rdoc Generator 2.