Class SCryptPasswordEncoder
java.lang.Object
org.springframework.security.crypto.scrypt.SCryptPasswordEncoder
- All Implemented Interfaces:
PasswordEncoder
Implementation of PasswordEncoder that uses the SCrypt hashing function. Clients can optionally supply a cpu cost parameter, a memory cost parameter and a parallelization parameter.
A few warnings:
- The currently implementation uses Bouncy castle which does not exploit parallelism/optimizations that password crackers will, so there is an unnecessary asymmetry between attacker and defender.
- Scrypt is based on Salsa20 which performs poorly in Java (on par with AES) but performs awesome (~4-5x faster) on SIMD capable platforms
- While there are some that would disagree, consider reading - Why I Don't Recommend Scrypt (for password storage)
-
Constructor Summary
ConstructorDescriptionSCryptPasswordEncoder
(int cpuCost, int memoryCost, int parallelization, int keyLength, int saltLength) Creates a new instance -
Method Summary
Modifier and TypeMethodDescriptionencode
(CharSequence rawPassword) Encode the raw password.boolean
matches
(CharSequence rawPassword, String encodedPassword) Verify the encoded password obtained from storage matches the submitted raw password after it too is encoded.boolean
upgradeEncoding
(String encodedPassword) Returns true if the encoded password should be encoded again for better security, else false.
-
Constructor Details
-
SCryptPasswordEncoder
public SCryptPasswordEncoder() -
SCryptPasswordEncoder
public SCryptPasswordEncoder(int cpuCost, int memoryCost, int parallelization, int keyLength, int saltLength) Creates a new instance- Parameters:
cpuCost
- cpu cost of the algorithm (as defined in scrypt this is N). must be power of 2 greater than 1. Default is currently 16,384 or 2^14)memoryCost
- memory cost of the algorithm (as defined in scrypt this is r) Default is currently 8.parallelization
- the parallelization of the algorithm (as defined in scrypt this is p) Default is currently 1. Note that the implementation does not currently take advantage of parallelization.keyLength
- key length for the algorithm (as defined in scrypt this is dkLen). The default is currently 32.saltLength
- salt length (as defined in scrypt this is the length of S). The default is currently 64.
-
-
Method Details
-
encode
Description copied from interface:PasswordEncoder
Encode the raw password. Generally, a good encoding algorithm applies a SHA-1 or greater hash combined with an 8-byte or greater randomly generated salt.- Specified by:
encode
in interfacePasswordEncoder
-
matches
Description copied from interface:PasswordEncoder
Verify the encoded password obtained from storage matches the submitted raw password after it too is encoded. Returns true if the passwords match, false if they do not. The stored password itself is never decoded.- Specified by:
matches
in interfacePasswordEncoder
- Parameters:
rawPassword
- the raw password to encode and matchencodedPassword
- the encoded password from storage to compare with- Returns:
- true if the raw password, after encoding, matches the encoded password from storage
-
upgradeEncoding
Description copied from interface:PasswordEncoder
Returns true if the encoded password should be encoded again for better security, else false. The default implementation always returns false.- Specified by:
upgradeEncoding
in interfacePasswordEncoder
- Parameters:
encodedPassword
- the encoded password to check- Returns:
- true if the encoded password should be encoded again for better security, else false.
-