Safely Storing Passwords

  • Stephen Haunts


Now that we have covered hashing and authenticated hashing, the next place to explore is the protection and storage of passwords. Passwords are still the most common way to authenticate a user, but it is easy to put yourself in a situation where your system is not secure and is susceptible to attacks. In this chapter we will explore various different password storage techniques and discuss their benefits and consequences.

Copyright information

© Stephen Haunts 2019

Authors and Affiliations

  • Stephen Haunts
    • 1
  1. 1.BelperUK

Personalised recommendations