PHP Secure Password Hashing

This blog post provides good information about password hashing. The main point of this article is to use strong encryption and make attackers life hard. So if someone gains access to database, attacker could figure out your password using a brute force or rainbow tables.


🐧 Get the latest tutorials on Linux, Open Source & DevOps via RSS feed or Weekly email newsletter.

🐧 2 comments so far... add one


CategoryList of Unix and Linux commands
Disk space analyzersdf duf ncdu pydf
File Managementcat cp mkdir tree
FirewallAlpine Awall CentOS 8 OpenSUSE RHEL 8 Ubuntu 16.04 Ubuntu 18.04 Ubuntu 20.04
Modern utilitiesbat exa
Network UtilitiesNetHogs dig host ip nmap
OpenVPNCentOS 7 CentOS 8 Debian 10 Debian 8/9 Ubuntu 18.04 Ubuntu 20.04
Package Managerapk apt
Processes Managementbg chroot cron disown fg glances gtop jobs killall kill pidof pstree pwdx time vtop
Searchingag grep whereis which
User Informationgroups id lastcomm last lid/libuser-lid logname members users whoami who w
WireGuard VPNAlpine CentOS 8 Debian 10 Firewall Ubuntu 20.04
2 comments… add one
  • jcinacio Dec 7, 2007 @ 10:36

    Yep, recent advances in CPU power allow recovering poorly hashed passwords.

    Besides the (not so obvious to some, but required) salt, there are a couple of rules:

    – password minimum length (unsalted passwords up to 8/9 chars can be easily recovered)
    – variable salt (you can store the salt for each password in the db as well, this increases it’s security exponentially)
    – strong hash function (md5 is considered weak nowadays, sha1 or even better sha256 is the way to go)

    … but most importantly, NEVER store passwords in plaintext, as i still see in many sites that send you your original password on recovery… :/

  • Lex Feb 12, 2008 @ 20:45

    How do you do the variable salt thing in PHP?

Leave a Reply

Your email address will not be published.

Use HTML <pre>...</pre> for code samples. Still have questions? Post it on our forum