Difference between revisions of "Cryptographic Fingerprint (SHA 256 Hash)"
(2 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
Hashes are one-way; this means that if someone sees the hash of your password it is extremely difficult to determine the password from the hash; only a brute-force method will suffice. | Hashes are one-way; this means that if someone sees the hash of your password it is extremely difficult to determine the password from the hash; only a brute-force method will suffice. | ||
− | This makes the SHA 256 Hash a good choice which to determine if your password is correct or not after it is first entered. We run the hash on your password once, store it, and subsequently compare the hash of your password with the original hash we stored. | + | This makes the [[SHA-256|SHA 256]] Hash a good choice which to determine if your password is correct or not after it is first entered. We run the hash on your password once, store it, and subsequently compare the hash of your password with the original hash we stored. |
It is currently industry best practice to store passwords using the SHA 256 Algorithm. | It is currently industry best practice to store passwords using the SHA 256 Algorithm. |
Latest revision as of 18:28, 31 July 2020
The easiest way to describe a Cryptographic Fingerprint (aka Hash) is that it generates a very large unique number for any given input. That is, if I have a 2GB file and I change 1 character in the file, the hashes will be very different.
Hashes are one-way; this means that if someone sees the hash of your password it is extremely difficult to determine the password from the hash; only a brute-force method will suffice.
This makes the SHA 256 Hash a good choice which to determine if your password is correct or not after it is first entered. We run the hash on your password once, store it, and subsequently compare the hash of your password with the original hash we stored.
It is currently industry best practice to store passwords using the SHA 256 Algorithm.