Recommend this page to a friend! |
![]() ![]() |
Info | ![]() |
![]() |
![]() ![]() |
Reputation | Support forum (2) | Blog | Links |
Last Updated | Ratings | Unique User Downloads | Download Rankings | |||||
2022-01-22 (3 months ago) ![]() | Not enough user ratings | Total: 1,019 | All time: 3,582 This week: 179![]() |
Version | License | PHP version | Categories | |||
securepassword 1.2 | GNU General Publi... | 5.6 | Cryptography |
Description | Author | |
This class can be used to generate password hashes and check whether a given password matches an hash. |
Class : SecurePassword ============================================================================================= This technique of generating password hash (or password digest) generates strong hash of plain text password. And for authentication, it matches a generated hash with a plain password. Modern computers can generate both md5() and sha1() very quickly, thousands per seconds. Thus generating hashes and matching with existing hashes (for hacking) is easy. The present technique implements a kind of hashing that makes strong salt, decodes that and makes hash with that decoded salt and the given password. It gives a variable length strong hash that makes attackers' job tough. Description: This technique - 1. Creates strong salt of given length 2. Makes that salt more strong by decoding it to binary data 3. Creates hash appending that salt to the output of secure hash algorithm - 1 (sha1)generated hash. Parameter of SHA1 in this case is (decoded salt + plainpassword) 4. In matching a password with a stored hash, (i) The salt is extracted from given/stored hash and decoded first (ii) Then sha1() is implemented on that salt + plain password (iii) Then this hash is compared with the sha1() generated-hash portion of given/stored hash Strength : 1. If no parameter is given, initSalt() generates random salt that eventually generates random password hash for the same plain password. 2. When password characters are only plaintext, attackers' job is easy. Use of base64_decode() helps this technique generate more strong password since the hash contains binary data. 3. Changing the length of salt (saltLength), you can generate password of variable lengths(upto 70 characters). This strengthens the password and makes attackers' job tough. And Me: I am a hardcore C/C++ and PHP programmer. I enjoy my times in implementing varities of freelancing works. In doing many kind of web works, I experienced some securiy issues and hence thought this technique. Then I designed and implemented this technique. Please rate this class if you like and if it comes to your needs. Please feel free to contact me for any suggestion and/or further assistance regarding the technique and its implementation. ============================================================================== MA Razzaque Rupom Moderator, phpResource Group http://groups.yahoo.com/group/phpresource/ My Blog : http://www.rupom.info Emails: rupom_315@yahoo.com rupom.bd@gmail.com |
![]() |
File | Role | Description |
---|---|---|
![]() ![]() |
Doc. | Documentation File |
![]() |
Class | Class File |
![]() ![]() |
Example | Usage Example |
Version Control | Unique User Downloads | Download Rankings | |||||||||||||||
0% |
|
|
Applications that use this package |
If you know an application of this package, send a message to the author to add a link here.
Pages that reference this package |
See My Class SecurePassword at phpclasses.org My class “SecurePassword” has been approved at phpclasses.org and it gave me the chance to be one of the top ten authors authors once again... |