On 30/04/15 19:03, Richard Falken wrote:
Crypto hashes are really powerful and are the standard way of storing
passwords in many systems.

You might now that a password hash is
$5$sdsd7f89sd7fsda89f7$9AO/NHJbfjwllqiFOOeq63ICdSDwaejGNa36IL6d4pC. You
might not use this information to find what the password that generates
this hash is. The reason is that cryptographic checksums work only one way.
You can take an input and turn it into a hash, but there is no practical
way to take a hash and find what the input is out.

When I later enter my password, the system *must* do something to that input to compare it to the saved data. So the system *must* know what that something was, so the process is repeatable.

--
Daniel

User agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 SeaMonkey/2.32 Build identifier: 20141218225909
or
User agent: Mozilla/5.0 (X11; Linux x86_64; rv:36.0) Gecko/20100101 SeaMonkey/2.33 Build identifier: 20150215202114
_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to