Tag: password-hashing

Found 117 results for 'password-hashing'.

1) rsa - Storing passwords in a publicly available database
2) elliptic-curves - Can ECDSA signature signing and verification process replaces password hashed based login system?
3) passwords - Do I need to use a CSPRNG when creating salts for user accounts?
4) encryption - Password to password mapping
5) sha-256 - How to pad a 448 bit message for SHA256?
6) public-key - Zencash uses your passphrase to identify AND unlock a wallet - how is this secure?
7) hash - Storing passphrase and encrypted private key
8) hash - Salt and pepper at both client and server sides?
9) hash - Password hash salt
10) key-derivation - Pepper and key derivation/stretching
11) pbkdf-2 - Deriving a key from a pseudo-random string
12) hash - Cryptocurrency serving as hash breaking?
13) key-derivation - Key Derivation Functions vs. Password Hashing Schemes
14) passwords - Password entropy much lower than entropy of encryption keys. Why is this acceptable?
15) keys - Why derive keys from a master key instead of generating random keys?
16) hash - Does a big salt have the same memory effects as Bcrypt?
17) passwords - How to configure Argon2d for commodity hardware?
18) password-hashing - Best password hashing strategy with Argon2 in a web app
19) brute-force-attack - RAR brute force cracking speed
20) hash - Salt length for a single password
21) salt - GUIDs as a salt
22) passwords - Do I need a salt for Scrypt if the data is client-side?
23) hash - Could a fixed RSA encryption be used instead of a salt to prevent rainbow table attacks?
24) hash - Choosing between hash functions instead of providing a salt for a password hash
25) passwords - Do I need to use a CSPRNG when creating salts for user accounts?
26) encryption - Do you use a salt when encrypting a password or just when hashing a password?
27) salt - Hashing user password without database to store salt
28) key-derivation - Key Derivation Functions vs. Password Hashing Schemes
29) encryption - Traditional DES scheme in Unix crypt function
30) sha-1 - Upgrade password hash in an existing system: Pbkdf2( salt , OldSha1Hash )
31) encryption - Understanding Encryption length calculation and rounds
32) passwords - Would this be considered a secure password hash?
33) hash - Would hashing a password twice prevent naive attacks?
34) passwords - Is this password-cracking challenge possible?
35) symmetric - Don't human generated passwords used with key derivation functions reduce the security of symmetric encryption?
36) password-hashing - Argon2 for both password storage and key derivation
37) aes - Does encrypting a result of AES block cipher provide more security?
38) password-hashing - What weaknesses would SHA256 hash array building and hashing the result have for password storage?
39) hash - What password hash function for the next 50 years?
40) passwords - How is the quality of a password calculated and what does it mean?
41) encryption - Rotating password with PBKDF2
42) hmac - Use peppers with Bcrypt (HMAC + Bcrypt)
43) hash - What is the probability of the first half of a hash output being identical to the first half of another hash output?
44) password-hashing - Industry standard recommendations for memory usage defaults for a password hashing function?
45) authentication - Is server-side password strength validation possible with client-side password hashing?
46) hash - Why do different applications of hash functions demand different properties of the hash function?
47) encryption - How slow is the hash used for Mac FileVault encryption?
48) passwords - Can pbkdf2 be used with a fixed salt to give a deterministic slow hash?
49) brute-force-attack - How to get a speedup linear in the number of iterations on unsalted iterated password hashing?
50) hash - Can you use a hash as a password?