On 07.02.2015, dennis@xxxxxxxxxxxxxxxxx wrote: > My conclusion would have been that if the passphrase is > initially at least as secure as a random key, then hashing can never > increase security but may decrease it. You need something to compare the passphrase to, and that's the hash. How would you check the validity of the entered passphrase otherwise? A plain text comparison is obviously impossible. An example which at least partially covers the same item is password storing by netshops, e.g. those who send you the plaintext passphrase when providing your email after hitting "Forgotten password". A breach into this password database reveals all passwords in clear text. Therefore, passwords usually are stored as their hash, and the clear text is deleted right after the hashing. That are those netshops which will provide a reset link to you after hitting the "Forgotten password" button, because they only have the hash, which can't be re-translated into the clear text passphrase. It's not only a problem of "security", but feasibility. _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt