Cooking with credentials – pepper
·
No meal is complete without salt AND pepper. No password hashing scheme is truly secure without both, either!
·
No meal is complete without salt AND pepper. No password hashing scheme is truly secure without both, either!
·
Learn how to securely hash and anonymize user passwords in PHP using native functions that automatically apply salt.
·
There are many ways to store user credentials for verification on the application side. Of all of them, only hashing is considered secure.
·
Phishing is all too common and far too successful, even today. What are some ways these scams succeed and how can you avoid them?
·
Let’s geek out on my favorite form of authentication – not sending passwords over the wire in the first place!
·
Sometimes, certain design patterns can aid in security as well as reusability of code. Let’s look at value objects as an example.
·
Learn how password reset and other tokens can be secured by splitting the data and leveraging common password hash methodologies.
·
Breaking encryption is fun. Building an encryption cipher is even more so! Let’s continue our Cryptopals journey with XOR.
·
Now that we know how to crack a single-byte XOR cipher, let’s expand and crack even more through Cryptopals’ next challenge.
·
Next up in our Cryptopals walkthrough is some frequency analysis against simple cryptographic keys. Let’s have some fun!