Linked Questions

4 votes
4 answers
16k views

I know this is a real dumb question and I am certainly talking complete rubbish, but let me explain: We have a long SHA-256 hash, e.g.: ...
rugk's user avatar
  • 1,325
1 vote
3 answers
3k views

I know md5 is considered non-secure but what if someone used md5(md5(password).salt) instead? Isn't this technically better / more secure?
user51819's user avatar
  • 127
-3 votes
1 answer
671 views

For example, a person having password 123456. it's MD5 is e10adc3949ba59abbe56e057f20f883e and SHA1 is 7c4a8d09ca3762af61e59520943dc26494f8941b and after joining both hashes. Which comes to be ...
Naman's user avatar
  • 175
1 vote
2 answers
2k views

Lets say I have a system in which I save the user's passwords using SHA-2. Now I was just wondering would it be a good approach if I take the MD5 hash of the password and then compute SHA-2 for the ...
Umair Afzal's user avatar
1 vote
2 answers
441 views

As of this morning any SHA-1 hash can officially be collided for as little as $110k in GPU power on Amazon. http://shattered.it/ https://arstechnica.com/security/2017/02/at-deaths-door-for-years-...
root-aj's user avatar
  • 613
544 votes
11 answers
96k views

A developer, let's call him 'Dave', insists on using home-brew scripts for password security. See Dave's proposal below. His team spent months adopting an industry standard protocol using Bcrypt. ...
nallenscott's user avatar
  • 4,719
294 votes
11 answers
97k views

Why shouldn't we create our own security schemes? I see a lot of questions around here about custom crypto and custom security mechanisms, especially around password hashing. With that in mind, I'm ...
Polynomial's user avatar
  • 136k
24 votes
6 answers
5k views

Imagine the following situation. We're making a web application which should be really safe Now the accounts/users are not directly added by us but they receive a letter with a logincode. We get a ...
Jester's user avatar
  • 663
44 votes
1 answer
19k views

Update: There is a better way to add a server side key, than using it as a pepper. With a pepper an attacker must gain additional privileges on the server to get the key. The same advantage we get by ...
martinstoeckli's user avatar
14 votes
3 answers
4k views

I read online that it's useless and basically impractical to hash a password with multiple hashing algorithms (and not just one) before storing them in a database. I don't really understand why that ...
ninesalt's user avatar
  • 250
4 votes
2 answers
1k views

I read this interesting question on why improvising your own Hash function out of existing hash functions is bad. However this is specifically focusing on 'mixing' existing hashfunctions. What if for ...
Thomas Wagenaar's user avatar
2 votes
3 answers
692 views

I'm using bcrypt for some web service requests that hash multiple passwords. The problem is that these web service requests can take minutes to complete due to bcrypt. Not very user friendly. My ...
ElectricSignal's user avatar
1 vote
3 answers
463 views

I've read about why MD5, SHA1, and many other hashing functions are insecure, by a lot, but I'm thinking of doing a different approach. It won't increase security, I'm aware of that, but I believe it ...
das's user avatar
  • 137
2 votes
2 answers
483 views

I was looking at our authentication system which hashes passwords differently than I was taught. The salt is a constant byte array and it uses the password + the salt as a key for the password hashing ...
user38044's user avatar
6 votes
2 answers
395 views

Simple question: Both MD5 and SHA1 are susceptible to a collision attack. It's reasonable to assume that SHA256, the next algorithm we're switching to, also has such an issue, but one that's hidden ...
Nzall's user avatar
  • 7,601