or,
h4xx0rz
>>
();
●●●●●●●p@$$w0rDs
If someone has your database,
they probably already have your secret key
Specifically, a "one-way cryptographic hash"
password123
8640bd46
hash
(black box)
digest
input
password123
8640bd46
password100
c9a7ffb9
password123
8640bd46
yoMama$566
1eb323d6
password123
8640bd46
8640bd46
digest in database:
password100
c9a7ffb9
≠
8640bd46
password123
8640bd46
=
8640bd46
0000000
0000001
0000002
0000003
0000004
0000005
0000006
00000A5
00000A6
00000A7
00000A8
00000A9
00000B0
00000Ba
0000ga0
0000gaa
0000gab
0000gac
0000gad
0000gae
0000gaf
0001dFk
0001dFl
0001dFm
0001dFn
0001dFo
0001dFp
0001dFq
000h4xu
000h4xv
000h4xw
000h4xx
000h4xy
000h4xz
000h4xA
password123
e73f51aa
digest
input
password123
8640bd46
digest
input
7fc7c392
salt
e73f51aa
salt:
password100
300829ce
≠
e73f51aa
7fc7c392
digest:
7fc7c392
+
password123
e73f51aa
=
e73f51aa
7fc7c392
+
password123
7fc7c392
e73f51aa
password123
a778eef2
53026489
password123
b8d12a9a
160bba71
user 1:
user 2:
user 3:
password123
8640bd46
180 billion per sec
280 trillion iterations in 25 minutes
password123
d523c864
158 per sec
280 trillion iterations in 56,000 years
MD5
bcrypt
😡😡😡
🙂
💩
😹
/giphy shrug
slides.com/tonyta/passwords