THE IMPORTANCE OF HASHING PASSWORDS, PART 2: SPICE IT UP
The first part of this article presented secure hash algorithms, the basic building blocks for password hashing. This part will now show how to apply these building blocks to construct a reasonable password hashing algorithm. Take it with a Pinch of Salt Since we now know much more about secure hash functions, can we use something like SHA-256 or maybe […]