salt

Salt/Hash for Firebase Simple Login?

扶醉桌前 提交于 2021-02-08 23:36:14
问题 Firebase offers 'Simple Login' in which email/password is used for authentication. Does anyone know if firebase salts and hashes the password before storing it? I imagine that firebase would know enough to do so, but I just wanted to make sure, because I could not find anything on this after an hour of searching. Anticipated follow up: If firebase in fact does not salt+hash the passwords, would the Simple Login work if I took the user's password, salted+hashed, and passed it onto firebase to

Salt/Hash for Firebase Simple Login?

我怕爱的太早我们不能终老 提交于 2021-02-08 23:29:24
问题 Firebase offers 'Simple Login' in which email/password is used for authentication. Does anyone know if firebase salts and hashes the password before storing it? I imagine that firebase would know enough to do so, but I just wanted to make sure, because I could not find anything on this after an hour of searching. Anticipated follow up: If firebase in fact does not salt+hash the passwords, would the Simple Login work if I took the user's password, salted+hashed, and passed it onto firebase to

Salt/Hash for Firebase Simple Login?

与世无争的帅哥 提交于 2021-02-08 23:19:11
问题 Firebase offers 'Simple Login' in which email/password is used for authentication. Does anyone know if firebase salts and hashes the password before storing it? I imagine that firebase would know enough to do so, but I just wanted to make sure, because I could not find anything on this after an hour of searching. Anticipated follow up: If firebase in fact does not salt+hash the passwords, would the Simple Login work if I took the user's password, salted+hashed, and passed it onto firebase to

Understanding the purpose of a salt in authentication

不打扰是莪最后的温柔 提交于 2021-01-28 20:11:27
问题 Based on my research the purpose of a salt is to defeat the use of a rainbow table. This is done because rainbow tables are only created to look up hashes of a sole password(without a salt). I am having a conflict understanding how we can't use rainbow tables in when salts are introduced. Suppose we have the following scenario: I am a malicious hacker and I want to gain access to a rich person's bank account. I am able to gain access to the bank's database which has the salt and the hashed

bcrypt node.js (auto-gen a salt and hash)

拥有回忆 提交于 2021-01-28 02:50:48
问题 I am using the following code to hash (and hopefully salt) user passwords before I store them in my DB. // hash the password before the user is saved ConsultantSchema.pre('save', function(next) { var user = this; // hash the password only if the password has been changed or user is new if (!user.isModified('password')) return next(); // generate the hash bcrypt.hash(user.password, null, null, function(err, hash) { if (err) { logger.error("bcrypt.hash "+err); return next(err); } // change the

bcrypt node.js (auto-gen a salt and hash)

一世执手 提交于 2021-01-27 23:46:55
问题 I am using the following code to hash (and hopefully salt) user passwords before I store them in my DB. // hash the password before the user is saved ConsultantSchema.pre('save', function(next) { var user = this; // hash the password only if the password has been changed or user is new if (!user.isModified('password')) return next(); // generate the hash bcrypt.hash(user.password, null, null, function(err, hash) { if (err) { logger.error("bcrypt.hash "+err); return next(err); } // change the

How to correctly encrypt and decrypt a file using a secret key derived from a password

隐身守侯 提交于 2020-12-05 20:20:27
问题 I am trying to work out the correct process to encrypt and decrypt a file using the "PBEWithHmacSHA256AndAES_256" standard. From what I understand from looking at this example code from Oracle. I have gathered that a salt is needed, as well as an iteration count and the hash standard. So I have my main method, passing into the encryption method: a user-defined password new String(key).toCharArray() as a byte array (using this method for other encryption runs) a secure random IV initVector as

How to correctly encrypt and decrypt a file using a secret key derived from a password

点点圈 提交于 2020-12-05 20:11:13
问题 I am trying to work out the correct process to encrypt and decrypt a file using the "PBEWithHmacSHA256AndAES_256" standard. From what I understand from looking at this example code from Oracle. I have gathered that a salt is needed, as well as an iteration count and the hash standard. So I have my main method, passing into the encryption method: a user-defined password new String(key).toCharArray() as a byte array (using this method for other encryption runs) a secure random IV initVector as

Is It okay to save user's salt in the same table as password hash?

安稳与你 提交于 2020-02-18 21:00:32
问题 Is it okay and isn't useless? It could be saved in another table or even another database. What do you think? P.S. For higher security, I have the constant salt "peanuts" too. It's constant value saved in configuration file (not in database). So if hacker want to somehow hack password, he need access to file server and database as well. 回答1: Yes, it's okay to store the per-user salt in the same table which stores the password hash ( not the password itself ) - even if the adversary gets

How does a database get hacked? A question about salting, etc

南笙酒味 提交于 2020-01-24 15:04:19
问题 Bear with me, I have been only learning PHP for only a few weeks, so example code may confuse me. I think I finally understand salting! It's to protect passwords inside database, if breached. What I don't understand is, why would a hacker have to crack hashes if they are trying to figure out a user's password (assuming that's their goal)? Wouldn't this be easier? Is the only defense from password guessing is to implement a limit of password entry X amount of times a day or CAPTCHA? How would