Secure Hash Algorithms

Want to add to the discussion?

All about SHA1, SHA2 and SHA256 hash algorithms
Redirected from Secure Hash Algorithm. You might be tempted to resolve the first caveat by pre-hashing your passwords before running them through bcrypt , but doing so can cause your application to run headfirst into the second. So much of our modern economy relies on crypto that we want a high security margin on it. Finally, I don't recommend people use iterative hashing directly - as I say in my question, you should use an existing primitive designed for the purpose. If the hacker steals your entire unencrypted database some how, the only thing a hashed salted password does is prevent him from impersonating the user for future signons - the hacker already has the data. Personally, I'm using SHA with a salt, but I'll definitely have to read more into bcrypt and re-evaluate. This is not a tech support subreddit.


I've been throwing out a lot of my food because I physically feel like I cannot eat that much, and if I do eat too much then I don't feel so good. However, I'm learning to keep all my meals small and frequent (just like I should have been doing all along!). I plan to definitely buy this product again, I really love it and finally, I've successfully changed my eating lifestyle.

Your Answer

security password-hashing cryptography brute-force-attacks Comments SHA is not a secure password hashing algorithm. SHA neither, regardless of . How secure is AES? up vote 60 down vote favorite. The cipher AES is used among other places in SSL/TLS across the Internet. It's considered among the top ciphers. In theory it's not crackable since the combinations of keys are massive. SHA is a hash function: it takes one input, and produces an output. If you feed SHA with a password and a salt, then you are really defining your own cryptographic protocols, based on SHA with some extra things, the extra things telling how the password and the salt are combined to make the SHA input. Designing .