PBKDF2 is used in WPA / WPA2 and Domain Cached Credentials 2 (AKA DCC2). You can change iterations for the HMAC-SHA1 to increase security. This method of slowing down the hacking process is not interrupted. However, since it is based on SHA1, you can call it GPU-friendly for attack.
Both, bcrypt and scrypt , use a lookup table. This memory dependency makes it GPU-unfriendly. However, the latest 28-inch GPU architectures, however, again activate very fast memory access.
You should now approve bcrypt or scrypt. This is a good choice for using memory-dependent hashes, but this may change in the future. Watch how the performance of GPU crackers increases. It is possible that they will reach the event horizon, on which it would be better to switch to the simple use of hashes other than the GPU, but increase their number of iterations.
source share