Tagged articles
15 articles
Page 1 of 1
Open Source Tech Hub
Open Source Tech Hub
Jul 25, 2024 · Information Security

Secure PHP Password Storage: From MD5+Salt to Bcrypt and Argon2

This guide explains why MD5 with salt is insecure, introduces stronger hashing algorithms like bcrypt and Argon2, and provides practical PHP examples using password_hash and password_verify to safely store and verify user passwords with built‑in salts and configurable cost factors.

PHPargon2bcrypt
0 likes · 8 min read
Secure PHP Password Storage: From MD5+Salt to Bcrypt and Argon2
Java High-Performance Architecture
Java High-Performance Architecture
May 17, 2024 · Information Security

How MaxKey SSO Delivers Secure, Scalable Single Sign‑On for Enterprises

MaxKey is an enterprise‑grade single sign‑on solution that supports OAuth 2.x, OpenID Connect, SAML 2.0, JWT, CAS and SCIM, offering secure identity management, RBAC, multi‑tenant capabilities, robust password policies, brute‑force protection, session control, and BCrypt‑based password encryption.

AuthenticationIdentity ManagementOAuth
0 likes · 11 min read
How MaxKey SSO Delivers Secure, Scalable Single Sign‑On for Enterprises
macrozheng
macrozheng
Apr 11, 2024 · Information Security

Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms

The article explains why MD5 and simple salted hashes are insecure for password storage, distinguishes between cryptographic and non‑cryptographic hash functions, introduces slow key‑derivation algorithms such as Bcrypt, Scrypt and Argon2, and recommends using strong KDFs with unique salts in modern applications.

KDFMD5bcrypt
0 likes · 7 min read
Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2023 · Backend Development

Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication

This guide demonstrates how to build a Spring Cloud Gateway for microservices, covering system setup, CORS handling, rate‑limiting with the token‑bucket algorithm, password hashing with BCrypt, and secure JWT‑based authentication, complete with Maven dependencies, configuration files, and filter implementations.

JWTbcryptrate-limiting
0 likes · 28 min read
Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication
Top Architect
Top Architect
Jan 7, 2023 · Backend Development

Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication

This article provides a step‑by‑step guide to building a Spring Cloud Gateway for microservices, covering system setup, request routing, cross‑origin handling, token‑bucket rate limiting, password hashing with BCrypt, an overview of symmetric and asymmetric encryption, and JWT‑based authentication with code examples and configuration details.

JWTMicroservicesSpring Cloud Gateway
0 likes · 24 min read
Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication
Code Ape Tech Column
Code Ape Tech Column
Sep 14, 2022 · Information Security

Understanding BCrypt and Password Hashing in Spring Security

This article explains the differences between hashing and encryption, demonstrates Java's built‑in hash implementations, discusses the insecurity of MD5 and rainbow‑table attacks, and provides a detailed guide on using BCrypt with Spring Security, including code examples and the PasswordEncoder interface.

bcryptencryptioninformation security
0 likes · 12 min read
Understanding BCrypt and Password Hashing in Spring Security
macrozheng
macrozheng
Jan 7, 2021 · Information Security

How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt

This article explains why transmitting passwords over plain HTTP is unsafe, introduces HTTPS and its TLS encryption process, compares symmetric and asymmetric encryption methods, and recommends secure password storage techniques such as salted hashing and BCrypt to protect against rainbow‑table and brute‑force attacks.

HTTPSHashingbcrypt
0 likes · 11 min read
How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Password Encryption, Transmission, and Secure Storage

This article explains how passwords should be encrypted during transmission using symmetric and asymmetric methods such as RSA, why HTTPS is essential, how services like GitHub and Baidu handle login security, and best practices for securely storing passwords with hashing, salting, and strong algorithms like BCrypt and PBKDF2.

HTTPSHashingPBKDF2
0 likes · 11 min read
Understanding Password Encryption, Transmission, and Secure Storage
21CTO
21CTO
Aug 27, 2017 · Information Security

How to Secure User Passwords: From Weak Hashes to PBKDF2, bcrypt, and scrypt

This article examines common password‑storage techniques, explains why plain‑text, symmetric encryption, and simple hashes are insecure, and demonstrates how modern algorithms like PBKDF2, bcrypt, and scrypt, together with proper salting and iteration, can effectively protect user credentials against large‑scale cracking attacks.

HashingPBKDF2bcrypt
0 likes · 8 min read
How to Secure User Passwords: From Weak Hashes to PBKDF2, bcrypt, and scrypt
Ctrip Technology
Ctrip Technology
Oct 24, 2016 · Information Security

User Password Encryption and Cracking Techniques

This article explains common user password storage methods, compares their security characteristics, and details various cracking approaches—including hash collisions, rainbow tables, and advanced algorithms like PBKDF2, bcrypt, and scrypt—while emphasizing the importance of strong encryption to mitigate data breach risks.

HashingPBKDF2bcrypt
0 likes · 8 min read
User Password Encryption and Cracking Techniques
Architect
Architect
Jun 9, 2015 · Information Security

Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.

The article explains that general‑purpose hash functions like MD5 and SHA families are fast and vulnerable to brute‑force attacks, while bcrypt’s deliberately slow, work‑factor‑adjustable design makes it a far more secure choice for storing passwords.

bcryptcryptographyhash functions
0 likes · 4 min read
Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.