Follow on Google News News By Tag Industry News News By Location Country(s) Industry News
Follow on Google News | ![]() Say no to plain passwords: Secure Password HashingThe easy-to-use back-end library CrococryptLib by HissenIT allows for the easiest integration of state-of-the-art password management.
By: HissenIT Why hashing Passwords? Simple question, easy answer: Passwords are still the most common authentication attribute for all kinds of applications and the average user tends to reuse “good” passwords. Hence, to protect the confidentiality of your user's passwords, passwords should not be stored in plain but only cryptographically secured. Password hashes are the most simple way to do this. As I said, most software frameworks dealing with passwords take already care of this. Other examples are account passwords used in operating systems like Linux, Windows or mobile systems. Secure hashing has become state-of-the- I heard password hashes are being cracked, how is that possible? Over the years, crypto experts and system developers have learned from hackers and how they attempt to crack hashes by optimized brute-force- This is why a secure hash function is not enough to create a secure hash in all cases. If you would hash credit card numbers (or IP addresses) without further measures, the input space for the hash function would be very small. Hashing all possible credit card numbers and storing their hashes into a database would be possible. A brute-force- Passwords are also relatively “small”. Moreover, since most passwords chosen by users are based on normal words, dictionary-attacks can be used for optimized brute-force- CrococryptLib In the context of password hashing, have you ever heard of “salt” and “iteration count”? These terms provide the state-of-the- An additional, individual salt per password makes attacks like rainbow tables infeasible. A salt is a long random value that is added to the password each time its hash has to be calculated. In practice, that means an application has to store additional values to create and verify passwords: the iteration count (globally or per password), the salt (per password) and the password hash value. That applies, if a single hash function is used. Otherwise, the hash function has to be stored per password as well. The iteration count and the length of the salt utilize a secure hash function actually secure! That being said, how to implement all these attributes for a secure hashing algorithm? The answer: Use a standard implementation! CrococryptLib (http://www.frankhissen.de/ End
|
|