Authen-Passphrase-SaltedSHA512
view release on metacpan or search on metacpan
lib/Authen/Passphrase/SaltedSHA512.pm view on Meta::CPAN
=item * L<Bytes::Random::Secure|http://search.cpan.org/perldoc?Bytes::Random::Secure>
=item * L<Wikipedia article on SHA-2 (SHA-512)|http://en.wikipedia.org/wiki/SHA-2>
=back
=head1 AUTHOR
David Oswald, C<< <davido at cpan.org> >>
=head1 BUGS AND LIMITATIONS
Please report any bugs or feature requests to
C<bug-authen-passphrase-saltedsha512 at rt.cpan.org>, or through the web
interface at L<http://rt.cpan.org/NoAuth/ReportBug.html?Queue=Authen-Passphrase-SaltedSHA512>.
I will be notified, and then you'll automatically be notified of progress on
your bug as I make changes.
Password protection and authentication is an arms race of sorts. For now,
SHA-512 hasn't been broken, and for now, the random number generator used
to generate random salt is considered cryptographically sound. However,
( run in 0.575 second using v1.01-cache-2.11-cpan-4d50c553e7e )