PHP Secure Password Hashing

Posted on in Categories Linux, php, Security, UNIX last updated December 5, 2007

This blog post provides good information about password hashing. The main point of this article is to use strong encryption and make attackers life hard. So if someone gains access to database, attacker could figure out your password using a brute force or rainbow tables.

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin and a trainer for the Linux operating system/Unix shell scripting. He has worked with global clients and in various industries, including IT, education, defense and space research, and the nonprofit sector. Follow him on Twitter, Facebook, Google+.

2 comment

  1. Yep, recent advances in CPU power allow recovering poorly hashed passwords.

    Besides the (not so obvious to some, but required) salt, there are a couple of rules:

    – password minimum length (unsalted passwords up to 8/9 chars can be easily recovered)
    – variable salt (you can store the salt for each password in the db as well, this increases it’s security exponentially)
    – strong hash function (md5 is considered weak nowadays, sha1 or even better sha256 is the way to go)

    … but most importantly, NEVER store passwords in plaintext, as i still see in many sites that send you your original password on recovery… :/

Leave a Comment