How can companies store passwords safely and keep them away from hackers? Well let's find out!
With all the data breaches lately, it's likely that the password of one of your accounts has been compromised. Hackers now might know the password you've used, but they also might not.. To understand why, we'll take a look at what methods a company can use to protect user passwords. We'll take a look at encryption, hash functions and a multilayer approach!
Akhawe, D. (2016). How Dropbox securely stores your passwords. Dropbox. Retrieved from https://blogs.dropbox.com/tech/2016/09/how-dropbox-securely-stores-your-passwords/
bcrypt. Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Bcrypt
Korosec, K. (2017). The 25 Most Common Passwords of 2017 Include "Star Wars". Fortune. Retrieved from http://fortune.com/2017/12/19/the-25-most-used-hackable-passwords-2017-star-wars-freedom/
PasswordSecurity. Retrieved from https://passwordsecurity.info
Hunt, T. Pwned websites. Retrieved from https://haveibeenpwned.com/PwnedWebsites
Gosney, J. M. Nvidia GTX 970 cudaHashcat Benchmarks. Retrieved from https://gist.github.com/epixoip/e885edc473e74398faf6
Friedl, S. An Illustrated Guide to Cryptographic Hashes. Retrieved from http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
Random String Generator. Randomness and Integrity Services Ltd. Retrieved from https://www.random.org/strings/?num=10&len=10&digits=on&upperalpha=on&loweralpha=on&unique=on&format=html&rnd=new
SHA3-512. Online Tools. Retrieved from https://emn178.github.io/online-tools/sha3_512.html
Salt (cryptography). Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Salt_(cryptography)
Hash function. Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Hash_function