php - password algorithm hash_algos overkill -
php - password algorithm hash_algos overkill -
just curious in speed , productivity , security in using hash_algos
array ( [0] => md2 [1] => md4 [2] => md5 [3] => sha1 [4] => sha224 [5] => sha256 [6] => sha384 [7] => sha512 [8] => ripemd128 [9] => ripemd160 [10] => ripemd256 [11] => ripemd320 [12] => whirlpool [13] => tiger128,3 [14] => tiger160,3 [15] => tiger192,3 [16] => tiger128,4 [17] => tiger160,4 [18] => tiger192,4 [19] => snefru [20] => snefru256 [21] => gost [22] => adler32 [23] => crc32 [24] => crc32b [25] => salsa10 [26] => salsa20 [27] => haval128,3 [28] => haval160,3 [29] => haval192,3 [30] => haval224,3 [31] => haval256,3 [32] => haval128,4 [33] => haval160,4 [34] => haval192,4 [35] => haval224,4 [36] => haval256,4 [37] => haval128,5 [38] => haval160,5 [39] => haval192,5 [40] => haval224,5 [41] => haval256,5 )
obviously overkill yet strictly speaking whim , wonderment looping these methods our password , salts , using our homecoming saying md5
beingness our lastly algorithm ran store. how long crack said password? ive read in documentation with password 8 or less characters in length takes 6 hours crack
in reference if our stipulations , regulations password was
one uppercase letter 2 numbers , no less 10 characters in length
then loop our password in hash_algs our password unbreakable though shouldn't utilize since these days able cracked.
so concerns feasible have heavy page load regulations passwords strength stronger overkill or fort knox security?
using of algorithms finish overkill. if you, generate random salt each user (possibly md5 hashing uniqid, example), , hash password said salt. blowfish encryption work great you.
php security hash md5 salt
Comments
Post a Comment