That is, even if somebody has access to the password database, they can't practically convert the hash values back to the passwords they need to enter to log in. The hash function is meant to be very hard to reverse. When you enter your password later, it is hashed with the same function and the results are compared: same results mean you must have entered the correct password. The hash function creates a hash value which is stored in the database. store the string “myPassword” directly in the database) since if someone can view the database, they can see all of the passwords.Įach system should run your password through a hash function before it is stored. But, it is insecure to store your password in plaintext (i.e. Of course, those systems have to somehow store the password so you can log in later. Think of all of the systems that know some password for you.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |