Category: Encryption
-
The Logic behind Password Hashing
This is a mirror of a post originally found here: http://security.stackexchange.com/questions/211/how-to-securely-hash-passwords/31846#31846 The Theory We need to hash passwords as a second line of defence. A server which can authenticate users necessarily contains, somewhere in its entrails, some data which can be used to validate a password. A very simple system would just store the passwords themselves, and…
-
Scientists show off 1st commercial network with unbreakable quantum encryption
Rather than base the encryption on complex maths, such systems use the laws of quantum theory – in particular, the Heisenberg Uncertainty Principle, which says quantum information cannot be measured without disturbing it. More Info…