Cooking with credentials – pepper
·
No meal is complete without salt AND pepper. No password hashing scheme is truly secure without both, either!
·
No meal is complete without salt AND pepper. No password hashing scheme is truly secure without both, either!
·
Learn how to securely hash and anonymize user passwords in PHP using native functions that automatically apply salt.
·
There are many ways to store user credentials for verification on the application side. Of all of them, only hashing is considered secure.
·
Hashing and encryption are two different things, even if they’re built upon the same cryptographic foundation.
·
Encryption, encoding, and hashing are three related but distinct concepts. It’s important for you to understand all three.