diff --git a/Ch2_Hashing/2.8.md b/Ch2_Hashing/2.8.md index f486da3..bea4f84 100644 --- a/Ch2_Hashing/2.8.md +++ b/Ch2_Hashing/2.8.md @@ -7,7 +7,7 @@ title: "2.8 MORE HASH, MORE TIME" > Choosing a complex-to-invert password is the responsibility > of the user, but the systems storing the passwords can also > slow down attackers by using a more complicated _hashing function_. -> Repeat any of the preceding exercies that use MD5, but now use SHA-1 +> Repeat any of the preceding exercises that use MD5, but now use SHA-1 > and SHA-256 instead. Record how much longer it takes to get through > the brute-force operations. Finally, try out bruteforce using scrypt. > You might not get very far!