![]() ![]() There are plenty of cryptographic functions to choose from such as the SHA2 family and the SHA - 3 family. The ideal authentication platform would integrate these two processes, hashing and salting, seamlessly. A better way to store passwords is to add a salt to the hashing process: adding additional random data to the input of a hashing function that makes each password hash unique. However, we also explored that hashing alone is not sufficient to mitigate more involved attacks such as rainbow tables. Instead, we want to provide a one-way road to security by hashing passwords. In previous posts to this Authentication Saga, we learned that storing passwords in plaintext must never be an option.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |