Today's Posts Follow Us On Twitter! TFL Members on Twitter  
Forum search: Advanced Search  
Navigation
Marketplace
  Members Login:
Lost password?
  Forum Statistics:
Forum Members: 24,254
Total Threads: 80,792
Total Posts: 566,472
There are 1882 users currently browsing (tf).
 
  Our Partners:
 
  TalkFreelance     Design and Development     Programming     PHP and MySQL :

Password encryption?

Thread title: Password encryption?
Closed Thread    
    Thread tools Search this thread Display Modes  
02-16-2007, 04:46 AM
#1
Amross is offline Amross
Status: Member
Join date: Jan 2007
Location:
Expertise:
Software:
 
Posts: 311
iTrader: 4 / 100%
 

Amross is on a distinguished road

  Old

Hashing a hash has numerous negative effects actually. A simple md5($salt.$password) [or a different hash if you prefer] would be more than sufficient in most cases. What is the point on going so overboard if you aren't something that would justify that, such as a bank? There are tons of real world examples that you would never be so extensive over something so simple, why is hashing any different?

Of course if security really is that big of a concern, then you should be skipping all that hash of a hash mumbo jumbo anyways and go right to something like a SHA-512 algorithm.

02-16-2007, 05:02 AM
#2
Zara is offline Zara
Status: Member
Join date: Apr 2006
Location:
Expertise:
Software:
 
Posts: 249
iTrader: 9 / 100%
 

Zara is on a distinguished road

  Old

Originally Posted by Amross View Post
Hashing a hash has numerous negative effects actually. A simple md5($salt.$password) [or a different hash if you prefer] would be more than sufficient in most cases. What is the point on going so overboard if you aren't something that would justify that, such as a bank? There are tons of real world examples that you would never be so extensive over something so simple, why is hashing any different?
Honestly, the extra security in a matter of 10 or so keystrokes is well worth it in my opinion. md5($salt.$password) may not be sufficient because encryptions are used to protect passwords even if the database is hacked... Therefore, if someone takes an MD5 hash to an MD5 hash library and finds a password 1171601767barneylove or what ever... Odds are they will be able to find out that 1171601767 is the users registration date as a unix timestamp which means barneylove would be the password.

And with any system I write and most php developers, we make a single class to handle all of the user functions. We'd write those extra 10 characters maybe 2 times max... Once for the user login function and once for the user registration function.

You are saying it has numerous negative effects, please do inform me. I have not heard of any, and the fact that nearly every php programmer I know uses the same methods as I do makes me very curious.

Closed Thread    


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 

  Posting Rules  
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump:
 
  Contains New Posts Forum Contains New Posts   Contains No New Posts Forum Contains No New Posts   A Closed Forum Forum is Closed