“Hashing” meaning and history

Hashing A hash function is an algorithm that takes variablelength string as the input and produces a fixed-length value (hash) as the output. The challenge for a hashing algorithm is to make this process irreversible; that is,finding a string that produces a given hash value should be very difficult. It should also be difficult toContinue reading ““Hashing” meaning and history”

Protection of the passwords

Early on, the most basic and least secure method of authentication was to store passwords in plaintext (i.e., unencrypted) in a database on the server. During authentication, the client would send his or her password to the server, and the server would compare this against the stored value. Obviously, however, if the passwordfile were accessibleContinue reading “Protection of the passwords”

Going behind the passwords..

Cryptography is a powerful mechanism for securing data and keeping them confidential. The idea is that the original message is scrambled via an algorithm (or cipher), and only those with the correct key can unlock the scrambled message and get back the plaintext contents. In general,the strength of a cryptographic algorithm is based on theContinue reading “Going behind the passwords..”

How to make a best password

The ancient folk tale of Ali Baba and the forty thieves mentions the use of a password. In this story, Ali Baba finds that the phrase “Open Sesame” magically opens the entrance to a cave where the thieves have hidden their treasure. Similarly, modern computer systems use passwords to authenticate users and allow them entranceContinue reading “How to make a best password”

Design a site like this with WordPress.com
Get started