Cryptography: Difference between revisions
From DWIKI
m (→Links) |
|||
Line 11: | Line 11: | ||
* $1 = MD5 hashing algorithm. | * $1 = MD5 hashing algorithm. | ||
* $2 =Blowfish Algorithm is in use. | * $2 =Blowfish Algorithm is in use. | ||
* $2a =eksblowfish Algorithm | * $2a = eksblowfish Algorithm | ||
* $5 =SHA-256 Algorithm | * $5 =SHA-256 Algorithm | ||
* $6 =SHA-512 Algorithm | * $6 =SHA-512 Algorithm | ||
* $P = phppass/joomla/wordpress MD5 | |||
==crypt== | ==crypt== |
Latest revision as of 12:16, 3 November 2022
Links
- Hashing security
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
- The Mathematical Guts of RSA Encryption
- Disk encryption
- How are passwords stored in Linux (Understanding hashing with shadow utils)
Password hashes
Password hash types, identified by first field
- $1 = MD5 hashing algorithm.
- $2 =Blowfish Algorithm is in use.
- $2a = eksblowfish Algorithm
- $5 =SHA-256 Algorithm
- $6 =SHA-512 Algorithm
- $P = phppass/joomla/wordpress MD5
crypt
man 3 crypt