- Hashing security
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
- The Mathematical Guts of RSA Encryption
- Disk encryption
- How are passwords stored in Linux (Understanding hashing with shadow utils)
Password hash types, identified by first field
- $1 = MD5 hashing algorithm.
- $2 =Blowfish Algorithm is in use.
- $2a =eksblowfish Algorithm
- $5 =SHA-256 Algorithm
- $6 =SHA-512 Algorithm
man 3 crypt