Score:2

composing password hash functions

cn flag

Firstly I know that what I'm asking about is not practical, so let's keep it theoretical.

Let $B[H](x)$ be balloon hashing with $H$ as it's underlying hash.
What happens if I do $B[H1](B[H2](x))$, where $H1, H2$ are distinct hash functions based on different construction, let's say blake2b and sha3?

Where do I lose security, and where do I gain it?

My intuition is that there should be benefit in preimage resistance, and in case one of underlying hashes is compromised.

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.