Cryptography: Difference between revisions
From DWIKI
mNo edit summary |
|||
(5 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
=Links= | =Links= | ||
*[https://crackstation.net/hashing-security.htm Hashing security] | |||
*[https://www.schneier.com/academic/archives/1997/04/the_risks_of_key_rec.html The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption] | |||
*[http://world.std.com/~franl/crypto/rsa-guts.html The Mathematical Guts of RSA Encryption] | *[http://world.std.com/~franl/crypto/rsa-guts.html The Mathematical Guts of RSA Encryption] | ||
*[[Disk encryption]] | *[[Disk encryption]] | ||
*[https://www.slashroot.in/how-are-passwords-stored-linux-understanding-hashing-shadow-utils How are passwords stored in Linux (Understanding hashing with shadow utils)] | |||
=Password hashes= | =Password hashes= | ||
==Password hash types, identified by first field== | |||
* $1 = MD5 hashing algorithm. | |||
* $2 =Blowfish Algorithm is in use. | |||
* $2a = eksblowfish Algorithm | |||
* | * $5 =SHA-256 Algorithm | ||
* $6 =SHA-512 Algorithm | |||
* $P = phppass/joomla/wordpress MD5 | |||
==crypt== | ==crypt== |
Latest revision as of 12:16, 3 November 2022
Links
- Hashing security
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
- The Mathematical Guts of RSA Encryption
- Disk encryption
- How are passwords stored in Linux (Understanding hashing with shadow utils)
Password hashes
Password hash types, identified by first field
- $1 = MD5 hashing algorithm.
- $2 =Blowfish Algorithm is in use.
- $2a = eksblowfish Algorithm
- $5 =SHA-256 Algorithm
- $6 =SHA-512 Algorithm
- $P = phppass/joomla/wordpress MD5
crypt
man 3 crypt