paint-brush
A Guide to Password Hashing: How to Keep your Database Safeby@danny
7,388 reads
7,388 reads

A Guide to Password Hashing: How to Keep your Database Safe

by Danny Denenberg3mSeptember 5th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Hashing algorithms take any string and turn it into a fixed-length “fingerprint” that is unable to be reversed. This means that if your data in your database is compromised, the hacker cannot get the user’s passwords if they were hashed well. Only secure, or cryptographic, hash functions can be used for password hashing (SHA256, SHA512, RipeMD, WHIRLPOOL, etc.)Sadly, just cryptographically hashing passwords does not ensure safety. The easiest way to decrypt a hash is just to guess the password.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - A Guide to Password Hashing: How to Keep your Database Safe
Danny Denenberg HackerNoon profile picture
Danny Denenberg

Danny Denenberg

@danny

Most likely in a musical right now. 🎭

About @danny
LEARN MORE ABOUT @DANNY'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Danny Denenberg HackerNoon profile picture
Danny Denenberg@danny
Most likely in a musical right now. 🎭

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite