Too Long; Didn't Read
When we discuss user authentication in an application, consequently, we already think about information security and how user data will be used and stored in the application.
Some security concepts and techniques are used such as encryption, hashing and salting to obtain a higher level of security, but each one has its purpose and we will introduce the concepts, differences and how it is used in practice in this article.
But what is the difference and when to apply each one?