Posts

Showing posts with the label hash

Choosing the Best Password Hashing Algorithm for PHP

Image
Introduction In today's digital landscape, security is paramount. The choice of a password hashing algorithm is a critical decision when it comes to safeguarding user data. As one of the most widely used programming languages for web applications, PHP offers several password hashing algorithms to protect passwords effectively. In this article, we will explore and explain in detail some of PHP's most commonly used password hashing algorithms, helping you make an informed decision on the best one for your application. 1. MD5 (Message Digest 5) Strength: Weak MD5 was once a popular choice for hashing passwords due to its simplicity and speed. However, it is now considered obsolete and insecure for password storage. MD5 generates a fixed 32-character hexadecimal hash for any input. One of the main issues with MD5 is its vulnerability to collision attacks, where two different inputs produce the same hash. Notice : Do not use MD5 for password hashing, especially in securi...

Encryption and Encoding

Image
  Encryption and Encoding Hello dev, in todays article I will be talking about encryption and encoding termnologies in software engineering. These are quiet important concepts necessary for any new bie in tech to know. Data is secured and preserved through encryption and encoding respectively. Also, by the end of this writeup you would understand that salting a password is different from the term encryption and encoding. What is encoding? Enc oding of data is the process of transforming information from one format into another . It is used to make data easier to transmit , store , and manipulate . For example , when sending data over the Internet , it is encoded into a format that is readable by the receiver . Data encoding is used to reduce the amount of data that needs to be stored or transmitted . This is done by using algorithms that compress or encode the data into a smaller and more efficient...

followers