Abstract
Now that we have covered hashing and authenticated hashing, the next place to explore is the protection and storage of passwords. Passwords are still the most common way to authenticate a user, but it is easy to put yourself in a situation where your system is not secure and is susceptible to attacks. In this chapter we will explore various different password storage techniques and discuss their benefits and consequences.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Stephen Haunts
About this chapter
Cite this chapter
Haunts, S. (2019). Safely Storing Passwords. In: Applied Cryptography in .NET and Azure Key Vault. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4375-6_5
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4375-6_5
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4374-9
Online ISBN: 978-1-4842-4375-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)