Skip to content

Commit d960703

Browse files
List example password hash algorithms early
We talk about these in detail later, but it's better to also list them early so that people will know what we mean (and thus are more likely to use them). Signed-off-by: David A. Wheeler <[email protected]>
1 parent 19e7bec commit d960703

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

secure_software_development_fundamentals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1054,7 +1054,7 @@ If your software manages secrets like private cryptographic keys and passwords,
10541054

10551055
* Do not put live secrets in your source code. Source code is managed by version control systems and often gets spread to more people and systems than you might think.
10561056

1057-
* Store passwords used for inbound authentication with an algorithm specifically designed to do this. We will discuss these later in the course, but these kinds of algorithms are called *iterated per-user salted hash* algorithms. If done correctly, it is infeasible for an attacker to determine many passwords even if the attacker gets the encrypted password data.
1057+
* Store passwords used for inbound authentication with an algorithm specifically designed to do this. We will discuss these later in the course, but these kinds of algorithms are called *iterated per-user salted hash* algorithms (such as argon2id, bcrypt, or PBKDF2). If done correctly, it is infeasible for an attacker to determine many passwords even if the attacker gets the encrypted password data.
10581058

10591059
* Use **https://** instead of **http://**; that provides an encrypted link to prevent data leakage.
10601060

0 commit comments

Comments
 (0)