Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
Password Hashing | Web Cyber Security
course content

Course Content

Cyber Security Fundamentals

Password HashingPassword Hashing

Password hashing is a security measure that protects user passwords by converting them into a hashed, irreversible format. Hashing is a one-way cryptographic function that transforms plaintext passwords into a fixed-length string of characters, making it challenging for attackers to reverse-engineer the original password.

Hashing is used on the Application Layer of the OSI model as a defense against attacks that aim to compromise user credentials and gain unauthorized access to systems or sensitive information.

Steps in Password Hashing

  1. User Registration: When a user creates an account or changes their password, the plaintext password is hashed;
  2. Hash Storage: The hashed password is stored in the database;
  3. Authentication: During login, the entered password is hashed, and the generated hash is compared with the stored hash. If they match, the authentication is successful.

Hashing is often used in pair with salting. Salting involves adding a unique, random value (salt) to each password before hashing. This ensures that even if two users have the same password, their hashed representations will be different due to the unique salt.

How is hashing done?

To understand hashing, we first have to consider the concept of hash function.
At its core, a hash function is a deterministic algorithm that takes input data and produces a fixed-size string of characters, commonly referred to as a hash value or hash code.

The Hashing Process

  1. Input Data Selection: The process begins by selecting the input data - any piece of information that requires protection. In our case, it is a password;
  2. Application of the Hash Function: The chosen hash function is applied to the input data. This involves the algorithm processing the data to generate a unique hash value;
  3. Hash Value Output: The computed hash value serves as the output of the hashing process - a string of characters with a fixed length;
  4. Salting usage: If we want to use salting, we combine a special generated salt with our input data before hashing.

Note

To provide hashing of text massages we have to convert them to a numerical format. We can do it by using ASCII table - a character encoding standard that assigns numeric values to letters, digits, and symbols, allowing computers to represent and communicate text using a common encoding scheme.

What does a hash value represent in the context of hashing?

Select the correct answer

Everything was clear?

Section 2. Chapter 5
course content

Course Content

Cyber Security Fundamentals

Password HashingPassword Hashing

Password hashing is a security measure that protects user passwords by converting them into a hashed, irreversible format. Hashing is a one-way cryptographic function that transforms plaintext passwords into a fixed-length string of characters, making it challenging for attackers to reverse-engineer the original password.

Hashing is used on the Application Layer of the OSI model as a defense against attacks that aim to compromise user credentials and gain unauthorized access to systems or sensitive information.

Steps in Password Hashing

  1. User Registration: When a user creates an account or changes their password, the plaintext password is hashed;
  2. Hash Storage: The hashed password is stored in the database;
  3. Authentication: During login, the entered password is hashed, and the generated hash is compared with the stored hash. If they match, the authentication is successful.

Hashing is often used in pair with salting. Salting involves adding a unique, random value (salt) to each password before hashing. This ensures that even if two users have the same password, their hashed representations will be different due to the unique salt.

How is hashing done?

To understand hashing, we first have to consider the concept of hash function.
At its core, a hash function is a deterministic algorithm that takes input data and produces a fixed-size string of characters, commonly referred to as a hash value or hash code.

The Hashing Process

  1. Input Data Selection: The process begins by selecting the input data - any piece of information that requires protection. In our case, it is a password;
  2. Application of the Hash Function: The chosen hash function is applied to the input data. This involves the algorithm processing the data to generate a unique hash value;
  3. Hash Value Output: The computed hash value serves as the output of the hashing process - a string of characters with a fixed length;
  4. Salting usage: If we want to use salting, we combine a special generated salt with our input data before hashing.

Note

To provide hashing of text massages we have to convert them to a numerical format. We can do it by using ASCII table - a character encoding standard that assigns numeric values to letters, digits, and symbols, allowing computers to represent and communicate text using a common encoding scheme.

What does a hash value represent in the context of hashing?

Select the correct answer

Everything was clear?

Section 2. Chapter 5
some-alt