Tag

bcrypt

0 views collected around this technical thread.

macrozheng
macrozheng
Apr 11, 2024 · Information Security

Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms

The article explains why MD5 and simple salted hashes are insecure for password storage, distinguishes between cryptographic and non‑cryptographic hash functions, introduces slow key‑derivation algorithms such as Bcrypt, Scrypt and Argon2, and recommends using strong KDFs with unique salts in modern applications.

KDFMD5bcrypt
0 likes · 7 min read
Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2023 · Backend Development

Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication

This guide demonstrates how to build a Spring Cloud Gateway for microservices, covering system setup, CORS handling, rate‑limiting with the token‑bucket algorithm, password hashing with BCrypt, and secure JWT‑based authentication, complete with Maven dependencies, configuration files, and filter implementations.

JWTRate LimitingSpring Boot
0 likes · 28 min read
Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication
Laravel Tech Community
Laravel Tech Community
Mar 13, 2023 · Information Security

PHP password_verify() Validation Error Vulnerability (CVE-2023-0567)

The PHP password_verify() function suffers a validation error vulnerability in certain versions where a "$" character in the BCrypt salt triggers a buffer over‑read, allowing any password to be accepted as valid and potentially enabling password‑less logins.

PHPPatchbcrypt
0 likes · 2 min read
PHP password_verify() Validation Error Vulnerability (CVE-2023-0567)
Top Architect
Top Architect
Jan 7, 2023 · Backend Development

Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication

This article provides a step‑by‑step guide to building a Spring Cloud Gateway for microservices, covering system setup, request routing, cross‑origin handling, token‑bucket rate limiting, password hashing with BCrypt, an overview of symmetric and asymmetric encryption, and JWT‑based authentication with code examples and configuration details.

JWTJavaRate Limiting
0 likes · 24 min read
Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication
Code Ape Tech Column
Code Ape Tech Column
Sep 14, 2022 · Information Security

Understanding BCrypt and Password Hashing in Spring Security

This article explains the differences between hashing and encryption, demonstrates Java's built‑in hash implementations, discusses the insecurity of MD5 and rainbow‑table attacks, and provides a detailed guide on using BCrypt with Spring Security, including code examples and the PasswordEncoder interface.

EncryptionSpring Securitybcrypt
0 likes · 12 min read
Understanding BCrypt and Password Hashing in Spring Security
macrozheng
macrozheng
Jan 7, 2021 · Information Security

How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt

This article explains why transmitting passwords over plain HTTP is unsafe, introduces HTTPS and its TLS encryption process, compares symmetric and asymmetric encryption methods, and recommends secure password storage techniques such as salted hashing and BCrypt to protect against rainbow‑table and brute‑force attacks.

EncryptionHTTPSHashing
0 likes · 11 min read
How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt
Laravel Tech Community
Laravel Tech Community
Apr 14, 2020 · Backend Development

Using Laravel's Hash Facade for Password Hashing and Verification

This guide explains how to use Laravel's Hash facade to securely hash passwords with Bcrypt or Argon2, configure hashing drivers, adjust algorithm parameters, and verify or rehash passwords using methods such as make, check, and needsRehash.

Argon2LaravelPHP
0 likes · 3 min read
Using Laravel's Hash Facade for Password Hashing and Verification
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Password Encryption, Transmission, and Secure Storage

This article explains how passwords should be encrypted during transmission using symmetric and asymmetric methods such as RSA, why HTTPS is essential, how services like GitHub and Baidu handle login security, and best practices for securely storing passwords with hashing, salting, and strong algorithms like BCrypt and PBKDF2.

EncryptionHTTPSHashing
0 likes · 11 min read
Understanding Password Encryption, Transmission, and Secure Storage
Ctrip Technology
Ctrip Technology
Oct 24, 2016 · Information Security

User Password Encryption and Cracking Techniques

This article explains common user password storage methods, compares their security characteristics, and details various cracking approaches—including hash collisions, rainbow tables, and advanced algorithms like PBKDF2, bcrypt, and scrypt—while emphasizing the importance of strong encryption to mitigate data breach risks.

EncryptionHashingPBKDF2
0 likes · 8 min read
User Password Encryption and Cracking Techniques
Architect
Architect
Jun 9, 2015 · Information Security

Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.

The article explains that general‑purpose hash functions like MD5 and SHA families are fast and vulnerable to brute‑force attacks, while bcrypt’s deliberately slow, work‑factor‑adjustable design makes it a far more secure choice for storing passwords.

bcryptcryptographyhash functions
0 likes · 4 min read
Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.