A Guide to Password Hashing: How to Keep your Database Safeby@danny
6,046

A Guide to Password Hashing: How to Keep your Database Safe

tldt arrow
Read on Terminal Reader🖨️

Hashing algorithms take any string and turn it into a fixed-length “fingerprint” that is unable to be reversed. This means that if your data in your database is compromised, the hacker cannot get the user’s passwords if they were hashed well. Only secure, or cryptographic, hash functions can be used for password hashing (SHA256, SHA512, RipeMD, WHIRLPOOL, etc.)Sadly, just cryptographically hashing passwords does not ensure safety. The easiest way to decrypt a hash is just to guess the password.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - A Guide to Password Hashing: How to Keep your Database Safe
Danny Denenberg HackerNoon profile picture

@danny

Danny Denenberg

undefined @danny
LEARN MORE ABOUT @DANNY'S EXPERTISE AND PLACE ON THE INTERNET.
react to story with heart

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa