Cryptography: Difference between revisions

From DWIKI
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
=Links=
=Links=
*[https://crackstation.net/hashing-security.htm Hashing security]
*[https://crackstation.net/hashing-security.htm Hashing security]
*[https://www.schneier.com/academic/archives/1997/04/the_risks_of_key_rec.html The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption]
*[http://world.std.com/~franl/crypto/rsa-guts.html The Mathematical Guts of RSA Encryption]
*[http://world.std.com/~franl/crypto/rsa-guts.html The Mathematical Guts of RSA Encryption]
*[[Disk encryption]]
*[[Disk encryption]]
Line 10: Line 11:
* $1 = MD5 hashing algorithm.
* $1 = MD5 hashing algorithm.
* $2 =Blowfish Algorithm is in use.
* $2 =Blowfish Algorithm is in use.
* $2a =eksblowfish Algorithm
* $2a = eksblowfish Algorithm
* $5 =SHA-256 Algorithm
* $5 =SHA-256 Algorithm
* $6 =SHA-512 Algorithm
* $6 =SHA-512 Algorithm
* $P = phppass/joomla/wordpress MD5


==crypt==
==crypt==

Latest revision as of 12:16, 3 November 2022

Links

Password hashes

Password hash types, identified by first field

  • $1 = MD5 hashing algorithm.
  • $2 =Blowfish Algorithm is in use.
  • $2a = eksblowfish Algorithm
  • $5 =SHA-256 Algorithm
  • $6 =SHA-512 Algorithm
  • $P = phppass/joomla/wordpress MD5

crypt

man 3 crypt

On freebsd