Cryptography: Difference between revisions
From DWIKI
m (→Links) |
m (→Links) |
||
Line 1: | Line 1: | ||
=Links= | =Links= | ||
*[https://crackstation.net/hashing-security.htm Hashing security] | *[https://crackstation.net/hashing-security.htm Hashing security] | ||
*[https://www.schneier.com/academic/archives/1997/04/the_risks_of_key_rec.html The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption] | |||
*[http://world.std.com/~franl/crypto/rsa-guts.html The Mathematical Guts of RSA Encryption] | *[http://world.std.com/~franl/crypto/rsa-guts.html The Mathematical Guts of RSA Encryption] | ||
*[[Disk encryption]] | *[[Disk encryption]] |
Revision as of 17:33, 19 March 2018
Links
- Hashing security
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
- The Mathematical Guts of RSA Encryption
- Disk encryption
- How are passwords stored in Linux (Understanding hashing with shadow utils)
Password hashes
Password hash types, identified by first field
- $1 = MD5 hashing algorithm.
- $2 =Blowfish Algorithm is in use.
- $2a =eksblowfish Algorithm
- $5 =SHA-256 Algorithm
- $6 =SHA-512 Algorithm
crypt
man 3 crypt