Answer the question
In order to leave comments, you need to log in
Does it make sense to hash already hashed passwords?
Good afternoon!
I read that MD5 + salt is not such a safe bundle, and as part of strengthening the security of my services, I decided to take action.
Now the database contains hashed (SHA256) user passwords + salt (uuid v4), does it make sense to hash them over, say, with Scrypt (or Bcrypt) or will it not make SHA256 more secure, but only by creating a garbage load?
Or does it make sense to enter the field crypto_type , where to store what hash the password was hashed with, and leave the old passwords alone, and only hash new users with Scrypt?
Answer the question
In order to leave comments, you need to log in
Yes, it makes sense for bcrypt at least. The purpose of bcrypt is to slow down the brute force process and make it resource intensive and difficult to implement on specialized hardware / GPUs / botnets etc. (see for example openwall.info/wiki/john/GPU/bcrypt). This greatly slows down the ability to guess even relatively weak passwords.
There are even more interesting algorithms, such as Argon2 and yescrypt.
It is not worth entering different hashes for different users, the solution with "rehashing" old hashes is quite safe.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question