how are passwords encrypted ?
- Street: Zone Z
- City: forum
- State: Florida
- Country: Afghanistan
- Zip/Postal Code: Commune
- Listed: 3 February 2023 3 h 34 min
- Expires: This ad has expired
Description
how are passwords encrypted ?
**Title: Understanding Password Encryption: The Role of Hashing, Salting, and Security Practices**
Passwords are the gatekeepers of our digital lives, safeguarding everything from emails to bank accounts. But when it comes to password security, many people assume passwords are “encrypted.” In reality, the process is more nuanced—and far more secure. Let’s break down how passwords are protected, common misconceptions, and why tools like hashing and salting are vital to staying safe.
—
### **Encryption vs. Hashing: Clearing Up the Confusion**
First, a clarification: **passwords are not encrypted—they’re **hashed**.**
– **Encryption** scrambles data using an algorithm (like AES), used for storing browser passwords in Microsoft Edge), which can be decrypted with a key.
– **Hashing** is a one-way process. It turns text into a fixed digest (e.g., SHA-1 or bcrypt), though SHA-1 is outdated). Unlike encryption, you can’t reverse-engineer the original password from the hash.
Companies often misuse the term “encryption” loosely, but storing passwords as hashes (not encrypted) is the standard practice.
—
### **How Hashing Works: A Step-by-Step Breakdown**
Here’s how a secure system handles passwords:
1. **Hashing the Password**:
When you set a password like “P@$$w0rd,” the system runs it through a hashing algorithm like **bcrypt** or **Argon2** (not SHA-1, which is now deprecated due to vulnerabilities).
2. **Adding Salt: A Layer of Uniqueness**
A **salt**—a random string—gets added to the password before hashing. For example:
– Raw Password: “P@$$w0rd” + Salt: `X!k4+` → Combined: “X!k4+P@$$w0rd”
– The combined text is hashed, producing a unique identifier stored in the database. Even if two users pick the same password, their salted hashes will differ.
3. **Verification**:
When you log in, the system rehashes your input with the stored salt and compares it to the database. No one can retrieve your original password, even if the database is breached.
—
### **Real-World Examples: Why These Methods (or Lack of Them) Matter**
– **When Systems Fail**: In 2020, a security flaw let doorbell systems send **plain text passwords** to Chinese servers. Without salting or hashing, attackers could read credentials instantly.
– **Industry Standards**: Microsoft Active Directory stores passwords using **hashes of salted values**, while IBM systems concatenate passwords with time stamps before hashing, adding extra layers.
—
### **Common Hashing Algorithms: Secure vs Insecure**
| Algorithm | Strength | Notes |
|———-|———-|——-|
| SHA-1 | Weak | Broken since 2017; avoid. Used, for example, in outdated systems. |
| bcrypt | Strong | Adds computational cost, slowing brute-force attacks. |
| Argon2 | Best-Practice | Winner of Password Hashing Competition (PHC), 2015); slows down attackers. |
—
### **Where Encryption *Does* Play a Role**
Encryption is still critical in other phases:
– **In Transit**: TLS/SSL encryption protects passwords during login (as seen in HTTPS).
– **At Rest**: Applications like Microsoft Edge encrypt stored passwords with **AES** on your device, but the core password is still hashed.
—
### **The Threats: When Security Fails**
– **Weak Hashing**: Systems using unsalted SHA-1 (as in some legacy IBM apps) risk breaches quickly.
– **Rainbow Attacks**: Without salt, criminals can crack identical passwords (e.g., “Password1”) in seconds using precomputed tables. Salting breaks this method.
—
### **A User-Friendly Checklist for Safeguarding Passwords**
For users:
– 🔒 **Use Password Managers**: Tools like **1Password** or **Bitwarden** generate strong, unique passwords.
– 🔎 **Demand Salts and Secure Hashes**: Always check if the platforms you use store hashed/salted passwords (e.g., avoid services using plain encryption or SHA-1).
– ⚙ **Enable Two-Factor Authentication (2FA)**: Even if a hash is stolen, 2FA adds a barrier.
For developers:
– Avoid SHA-1; use bcrypt/Argon2.
– Always add unique salts.
—
### **Why “Password Encryption” Is a Myth**
The confusion arises because both terms involve math, but the purpose differs:
– Encryption: **Reversible** (to read the data), if decrypted).
– Hashing: **Irreversible.**
When vendors market “encrypted passwords,” they likely mean **salted hashing**. Beware services claiming to encrypt passwords in databases—for real security, they must use hashing.
—
### **Conclusion: It’s a Shared Responsibility**
Password protection hinges on hashing, salting, *and* user caution. While systems like Microsoft Edge encrypt stored files, the foundation remains hashing. The 2020 doorbell disaster shows the stakes: without these methods, credentials leaks become data disasters.
Stay informed, choose robust algorithms like Argon2 + salt, and remember: never reuse passwords. Your online safety depends on it!
—
**Further Reading**
– Okta’s Guide to Password Security: [Here](https://www.okta.com)
– Microsoft’s Technical Insights: [Active Directory Password Storage](https://learn.microsoft.com)
– Why Bcrypt? [IBM’s Take](https://www.ibm.com)
**Featured Tools**
– **Top Tools for Secure Password Management**: LastPass, Bitwarden, and RoboForm.
Stay safe—your password’s safety depends on both tech innovation *and* user vigilance.
—
This post clarifies the hashing vs. encryption debate, provides actionable advice, and underscores why proper password handling isn’t just for tech pros—it’s everyone’s priority.
244 total views, 1 today
Recent Comments