Google recently announced "the first practical technique for generating a collision" for SHA-1. I'm currently planning a password hashing implementation for a website, and historically we have used PBKDF2 as that's the default tool on our framework of choice - .NET.
They've specifically condemned SHA-1 for TLS certificates, but does this condemnation still apply to password hashing for websites? Is PBKDF2 no longer a safe pick given this revelation?
the .net implementation is slow compared to a good implementation, widening the gap between the defenders performance and the attackers performance. Thus lowering security compared to a defender that uses a good implementation that allows them to choose a higher iteration count. – CodesInChaos
– AviD Apr 20 '17 at 11:28