answersLogoWhite

0

MD5 and SHA1 are quite common.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What data type is suitable for password field?

We never store passwords in a password field. If we did that, anyone with access to the database would have access to all the passwords. Instead, we store the output from a one-way cryptographic hashing function. That is, when a user creates a password, we store the hash value generated from that password via the hashing function. When the user subsequently enters their password in order to log on, the hash value generated by the entered password is compared with the stored hash value. If the two hash values match exactly then the correct password was entered. Being one-way, it is not possible to determine the password from the hash value, even if we know the precise implementation details of the hash function employed to create the hash value. This is the safest way to store passwords; we simply need to ensure that the same hash function that was used to generate the hash is also used to validate the user's password at logon. Cryptographic hashes can vary in length depending on which function was used to generate the hash value. Typical values are 128-bit, 160-bit, 256-bit and 512-bit, thus a fixed-length binary field of the required length would be suitable for storing the hash values.


How do you create hash of password?

I'm not sure i got your question right or not, but if you mean how to encrypt password for saving or ect, use md5 function


What does the term "hash" mean in programming and how is it used in software development?

In programming, "hash" refers to a function that converts input data into a fixed-size string of characters. This string is unique to the input data, making it useful for storing and retrieving data quickly in software development. Hash functions are commonly used for tasks like data encryption, password storage, and indexing in databases.


How do you get a Windows XP password from a password hash?

There are several tools that will determine the password from the hash. You can find them via any Internet search engine.


What is lamport hash?

Lamport's hash implements a one-time password protecting against eavesdropping and password file theft.


What is the best way of referring to the output of a secure hash function?

The output from a hash function is referred to as the hash value, hash code, hash sum, checksum or just plain "hash" as in "the hash of the file is...". Generally a hash function is presumed to be secure or it wouldn't be used. If a hash is not secure it could be referred to as "worthless" or "false sense of security".


What is hash key?

hash key is an element in the hash table. it is the data that you will combine (mathematical) with hash function to produce the hash.


What is a hash function?

hash function is technique used in message authentication it is attached to the message for security purpose


Insert value into hash table?

Insertion in hash tables is based on a 'key' value which is calculated on the basis of a hash function. This hash function generates the key based on what type of data it is fed. For example hash function for an integer input might look like this : int hash(int val) { return (val%101); } where return value of hash function would become a key. Complete implementation can be found at: http://simplestcodings.blogspot.com/2010/07/hash-table.html


Define hashing and describe briefly including types of hashing and where it is used and advantages and disadvantages of hashing?

Hashing is performed on arbitrary data by a hash function. A hash function is any function that can convert data to either a number or an alphanumeric code. There are possibly as many types of hashing as there are data. How precisely the hash function works depends on what data it is meant to generate a hash code from. Hashing is used for a variety of things. For example, a hash table is a data structure used for storing data in memory. Instead of iterating through the structure to find a specific item, we associate a key (hash code) to a particular item (data). A hash code can be generated from a file or disk image. If the data does not match the code, then the data is assumed to be corrupted. Hashing has the advantage of taking a larger amount of data and representing it as a smaller amount of data (hash code). The code generated is unique to the data it came from. Generating a hash code can take time however, depending on the function and the data. Some hash functions include Bernstein hash, Fowler-Noll-Vo hash, Jenkins hash, MurmurHash, Pearson hashing and Zobrist hashing.


If you forget your password can you get it back?

Generally speaking, no. The way secure websites and programs store passwords is in a hash, not plaintext. When you submit your password, the password you give is encrypted and compared to the stored password hash you originally gave. Since the encryption cannot be undone, your original password cannot be provided to you.


What code should you write in c plus plus that if the user enters a particular word then it further proceeds?

You're talking about password entry. For that you will need a one-way cryptographic hashing function. The hashing function converts a user's name and password into a hash value which can be openly stored on disk. Being a one-way function, even if an intruder knows the hash values, it is not possible for them to determine which user name and password combination was used to generate which hash value other than by brute force. The most widely used cryptographic hash functions are SHA-1 (Secure Hash algorithm 1) and MD5 (named after the Merkle-Damgård construction upon which it is based). However, SHA-1 implementations are being dropped due to well-funded intrusions which suggest it is no longer secure. It has since been replaced by SHA-2 and SHA-3.