Hash functions

How can companies store passwords safely and keep them away from hackers? Well let's find out!

With all the data breaches lately, it's likely that the password of one of your accounts has been compromised. Hackers now might know the password you've used, but they also might not.. To understand why, we'll take a look at what methods a company can use to protect user passwords. We'll take a look at encryption, hash functions and a multilayer approach!


Akhawe, D. (2016). How Dropbox securely stores your passwords. Dropbox. Retrieved from https://blogs.dropbox.com/tech/2016/09/how-dropbox-securely-stores-your-passwords/

bcrypt. Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Bcrypt

Korosec, K. (2017). The 25 Most Common Passwords of 2017 Include "Star Wars". Fortune. Retrieved from http://fortune.com/2017/12/19/the-25-most-used-hackable-passwords-2017-star-wars-freedom/

PasswordSecurity. Retrieved from https://passwordsecurity.info

Hunt, T. Pwned websites. Retrieved from https://haveibeenpwned.com/PwnedWebsites

Gosney, J. M. Nvidia GTX 970 cudaHashcat Benchmarks. Retrieved from https://gist.github.com/epixoip/e885edc473e74398faf6

Friedl, S. An Illustrated Guide to Cryptographic Hashes. Retrieved from http://www.unixwiz.net/techtips/iguide-crypto-hashes.html

Random String Generator. Randomness and Integrity Services Ltd. Retrieved from https://www.random.org/strings/?num=10&len=10&digits=on&upperalpha=on&loweralpha=on&unique=on&format=html&rnd=new

SHA3-512. Online Tools. Retrieved from https://emn178.github.io/online-tools/sha3_512.html

Salt (cryptography). Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Salt_(cryptography)

Hash function. Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Hash_function