We know that if the password is hashed directly, then the hacker can get a hash value by obtaining this password, and then by checking the hash value dictionary (for example, MD5 password cracking site), the password of a user.Adding salt can solve
Transferred from: http://blog.csdn.net/blade2001/article/details/6341078We know that if the password is hashed directly, then the hacker can get a hash value by obtaining this password, and then by checking the hash value dictionary (for example, MD5
This article will explain to you how to use Node.js the Crypto module to add salt to your password hash . Here, we will not make a detailed comparison of the password storage methods that we do not understand. What we are going to do is to know the
If the password is hashed directly, the hacker can obtain the password of a user by querying the hash dictionary (for example, MD5 password cracking website. After adding the salt, it will be much more difficult. even if you have obtained the salt
The first time I heard about the value of salt encryption, it always feels strange. Because it is always associated with salty, the association of the password is salty.in fact, the salt mentioned here, simply said, is a set of safe random numbers.
(a) Why do I use hash functions to encrypt passwords
If you need to save a password (such as a website user's password), you should consider how to protect the password data, and it is extremely unsafe to write the password directly to the database
password by adding salt, you can increase the complexity of the password, even if the simplest password, after adding salt, can also become a complex string, which greatly improve the difficulty of password cracking. However, if the salt is hard
Currently, the MD5 password database has a huge amount of data, and most common passwords can reverse query the plaintext of the password through the MD5 Digest. To prevent internal personnel (persons who can access database or database backup files)
Detailed explanation of how to execute hash and salt operations on passwords
The hash and salt operations on passwords are not unfamiliar. The two Visual Studio Enterprise Edition examples use this method to encrypt this
1, first of all, briefly talk about the development of the regular Web login module (for simple login function, the database fields are not encrypted and encrypted during transmission)
Non-Secure Login module development
Using Jsp+mysql
The database
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.