Cryptography: Difference between revisions

From DWIKI
Line 1: Line 1:
=Links=
=Links=
*[https://crackstation.net/hashing-security.htm Hashing security]
*[https://crackstation.net/hashing-security.htm Hashing security]
*[https://www.schneier.com/academic/archives/1997/04/the_risks_of_key_rec.html The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption]
*[http://world.std.com/~franl/crypto/rsa-guts.html The Mathematical Guts of RSA Encryption]
*[http://world.std.com/~franl/crypto/rsa-guts.html The Mathematical Guts of RSA Encryption]
*[[Disk encryption]]
*[[Disk encryption]]

Revision as of 18:33, 19 March 2018

Links

Password hashes

Password hash types, identified by first field

  • $1 = MD5 hashing algorithm.
  • $2 =Blowfish Algorithm is in use.
  • $2a =eksblowfish Algorithm
  • $5 =SHA-256 Algorithm
  • $6 =SHA-512 Algorithm

crypt

man 3 crypt

On freebsd