Tag: cryptography

  • Bcrpty

    Bcrypt is a cryptographic hashing algorithm specifically designed to securely hash passwords. Based on the Blowfish cipher, Bcrypt was introduced in 1999 by Niels Provos and David Mazieres to overcome the vulnerabilities of traditional hashing algorithms such as MD5 and SHA-1. Its primary focus is on providing strong resistance against brute-force attacks, which are becoming…

  • Hashing Algorithm: Infra Security POV

    In the realm of infrastructure security, hashing algorithms play a critical role in ensuring data integrity, confidentiality, and authentication. These cryptographic functions transform input data of any length into a fixed-size output, known as a hash. Hashing is used extensively in securing passwords, verifying the integrity of files, and enabling efficient data retrieval. In this…