<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Kommentare zu: PHP: Easy to use and secure PHP hashing Class</title>
	<atom:link href="http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/feed" rel="self" type="application/rss+xml" />
	<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html</link>
	<description>Ich bin nicht verrückt, nur technisch begabt ...</description>
	<lastBuildDate>Fri, 26 Sep 2014 12:04:55 -0400</lastBuildDate>
	<generator>http://wordpress.org/?v=2.8.2</generator>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
		<item>
		<title>Von: Julius</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-1520</link>
		<dc:creator>Julius</dc:creator>
		<pubDate>Sun, 23 Sep 2012 11:34:59 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-1520</guid>
		<description>Thanks Alejandro for your comment.

From your point of view, my scheme might be too simple to be called secure. But when working with php, you are quite limited what kind of solution can be done with common effort. Why i used sha1 and md5 is, because PHP offers them in nearly every version today. Other functions need specific modules that are not always installed.

The point with the FPGA is correct, its the way it goes with more powerfull hardware over time.

The comment about salt length is truly incorrect. A longer salt will result a in a &quot;more secure&quot; hash because the number of possibilites for a attack that does not have the salt will increase. But if the attacker already got the salt, i think it does not make a difference, if its 4 or 8 chars long.

Thanks for your AES comment, that is something i did not know yet.

As you can see, the solution is not perfect ;)
But i always hoped to inspire and teach people, to have an eye on that topic because it is fundamental knowledge of hashing.</description>
		<content:encoded><![CDATA[<p>Thanks Alejandro for your comment.</p>
<p>From your point of view, my scheme might be too simple to be called secure. But when working with php, you are quite limited what kind of solution can be done with common effort. Why i used sha1 and md5 is, because PHP offers them in nearly every version today. Other functions need specific modules that are not always installed.</p>
<p>The point with the FPGA is correct, its the way it goes with more powerfull hardware over time.</p>
<p>The comment about salt length is truly incorrect. A longer salt will result a in a "more secure" hash because the number of possibilites for a attack that does not have the salt will increase. But if the attacker already got the salt, i think it does not make a difference, if its 4 or 8 chars long.</p>
<p>Thanks for your AES comment, that is something i did not know yet.</p>
<p>As you can see, the solution is not perfect ;)<br />
But i always hoped to inspire and teach people, to have an eye on that topic because it is fundamental knowledge of hashing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Von: Alejandro</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-1518</link>
		<dc:creator>Alejandro</dc:creator>
		<pubDate>Sun, 26 Aug 2012 12:45:39 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-1518</guid>
		<description>Hi Julius, i need to tell you that this scheme isn&#039;t secure, i know it is hard to get, but the only functions that actually increase the security of your scheme are the random salt and the multiple hashing, and the multiple hashing can be easily broke with an FPGA in no time, because you are using sha-1.
Your commentary about the 4 bytes salt is simply wrong, even the PBKDF uses a salt of 8 bytes (new schemes use nonces with at least 32 bytes), the size of the salt matters.
The global salt + the permutation = bad cipher
if you want to do this, it&#039;s a better idea using a block cipher like AES
key + AES
The AES-key is a global salt, and AES is a permutation (by definition), the diference between your salt+permutation and key+AES is: your permutation is linear, then, it is easy to compute.</description>
		<content:encoded><![CDATA[<p>Hi Julius, i need to tell you that this scheme isn't secure, i know it is hard to get, but the only functions that actually increase the security of your scheme are the random salt and the multiple hashing, and the multiple hashing can be easily broke with an FPGA in no time, because you are using sha-1.<br />
Your commentary about the 4 bytes salt is simply wrong, even the PBKDF uses a salt of 8 bytes (new schemes use nonces with at least 32 bytes), the size of the salt matters.<br />
The global salt + the permutation = bad cipher<br />
if you want to do this, it's a better idea using a block cipher like AES<br />
key + AES<br />
The AES-key is a global salt, and AES is a permutation (by definition), the diference between your salt+permutation and key+AES is: your permutation is linear, then, it is easy to compute.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Von: Macs</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-1476</link>
		<dc:creator>Macs</dc:creator>
		<pubDate>Wed, 15 Feb 2012 09:44:54 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-1476</guid>
		<description>Hi Julius

Please ignore my  last comment.  I understand now

Great stuff, thank-you

Regards
Macs</description>
		<content:encoded><![CDATA[<p>Hi Julius</p>
<p>Please ignore my  last comment.  I understand now</p>
<p>Great stuff, thank-you</p>
<p>Regards<br />
Macs</p>
]]></content:encoded>
	</item>
	<item>
		<title>Von: Julius</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-1475</link>
		<dc:creator>Julius</dc:creator>
		<pubDate>Wed, 15 Feb 2012 09:36:56 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-1475</guid>
		<description>It seems as if you missed the part, that for each hash a random salt is used, that is stored inside the returned hash. This is a security measurment to avoid hashes beeing cracked too fast.
More info can be found here: http://en.wikipedia.org/wiki/Salting_%28cryptography%29</description>
		<content:encoded><![CDATA[<p>It seems as if you missed the part, that for each hash a random salt is used, that is stored inside the returned hash. This is a security measurment to avoid hashes beeing cracked too fast.<br />
More info can be found here: <a href="http://en.wikipedia.org/wiki/Salting_%28cryptography%29" rel="nofollow">http://en.wikipedia.org/wiki/Salting_%28cryptography%29</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>Von: Macs</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-1474</link>
		<dc:creator>Macs</dc:creator>
		<pubDate>Wed, 15 Feb 2012 09:19:04 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-1474</guid>
		<description>Hi Julius

Please forgive my ignorance, however, the code and example that you give generates a unique hash on each occasion that it is executed for the same password.

Is this intended and a I missing something.  

Regards
Macs</description>
		<content:encoded><![CDATA[<p>Hi Julius</p>
<p>Please forgive my ignorance, however, the code and example that you give generates a unique hash on each occasion that it is executed for the same password.</p>
<p>Is this intended and a I missing something.  </p>
<p>Regards<br />
Macs</p>
]]></content:encoded>
	</item>
	<item>
		<title>Von: Julius</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-1413</link>
		<dc:creator>Julius</dc:creator>
		<pubDate>Mon, 01 Aug 2011 19:46:58 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-1413</guid>
		<description>There is no way to get the password from a hash.
Hashes just work the way Input (like a password) -hashing-&gt; Hash. Not the other way round.
Encryption can do Input -encrypting-&gt; Encrypted Input -decrypting-&gt; Input but that aint practical.

Sending plain passwords via Email is also a security risk. I would avoid that.
Best way for you should be sending a unique link that can only be used once for resetting a password on your website.

Regards, Julius</description>
		<content:encoded><![CDATA[<p>There is no way to get the password from a hash.<br />
Hashes just work the way Input (like a password) -hashing-&gt; Hash. Not the other way round.<br />
Encryption can do Input -encrypting-&gt; Encrypted Input -decrypting-&gt; Input but that aint practical.</p>
<p>Sending plain passwords via Email is also a security risk. I would avoid that.<br />
Best way for you should be sending a unique link that can only be used once for resetting a password on your website.</p>
<p>Regards, Julius</p>
]]></content:encoded>
	</item>
	<item>
		<title>Von: Tazek</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-1412</link>
		<dc:creator>Tazek</dc:creator>
		<pubDate>Mon, 01 Aug 2011 18:29:35 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-1412</guid>
		<description>Hi Julius,

I have a question: I&#039;m using your class on my login system. This login system has a &quot;reset password&quot; page, which sends the password by e-mail. I&#039;d like to find someway to &quot;generate&quot; the password from the hash.

What&#039;s the easy way to do it?

Thanks!</description>
		<content:encoded><![CDATA[<p>Hi Julius,</p>
<p>I have a question: I'm using your class on my login system. This login system has a "reset password" page, which sends the password by e-mail. I'd like to find someway to "generate" the password from the hash.</p>
<p>What's the easy way to do it?</p>
<p>Thanks!</p>
]]></content:encoded>
	</item>
	<item>
		<title>Von: Julius</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-1411</link>
		<dc:creator>Julius</dc:creator>
		<pubDate>Mon, 01 Aug 2011 09:57:27 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-1411</guid>
		<description>Hi Tazek,
i think i should do da rewrite of that code and publish it on github.
But that has to wait for after exams.
Regards, Julius</description>
		<content:encoded><![CDATA[<p>Hi Tazek,<br />
i think i should do da rewrite of that code and publish it on github.<br />
But that has to wait for after exams.<br />
Regards, Julius</p>
]]></content:encoded>
	</item>
	<item>
		<title>Von: Tazek</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-1410</link>
		<dc:creator>Tazek</dc:creator>
		<pubDate>Sun, 31 Jul 2011 15:54:57 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-1410</guid>
		<description>Hi,

Your class seems to be really useful.
Is it the latest version? How can I get further updates?

Thank you!

Best,
Tazek</description>
		<content:encoded><![CDATA[<p>Hi,</p>
<p>Your class seems to be really useful.<br />
Is it the latest version? How can I get further updates?</p>
<p>Thank you!</p>
<p>Best,<br />
Tazek</p>
]]></content:encoded>
	</item>
	<item>
		<title>Von: bucabay</title>
		<link>http://juliusbeckmann.de/blog/easy-to-use-and-secure-php-hashing-class.html/comment-page-1#comment-498</link>
		<dc:creator>bucabay</dc:creator>
		<pubDate>Tue, 20 Oct 2009 23:02:28 +0000</pubDate>
		<guid isPermaLink="false">http://juliusbeckmann.de/blog/?p=449#comment-498</guid>
		<description>I think you hit the nail on the head with this one. There is a lot of bad advice that is just followed blindly regarding hashing of passwords. Especially the common advice that double hashing is bad, when it is used in my applications: http://en.wikipedia.org/wiki/Key_strengthening

I like the global hash and custom hash function. You could however consider the global salt, and custom hashing function. 

Great work!</description>
		<content:encoded><![CDATA[<p>I think you hit the nail on the head with this one. There is a lot of bad advice that is just followed blindly regarding hashing of passwords. Especially the common advice that double hashing is bad, when it is used in my applications: <a href="http://en.wikipedia.org/wiki/Key_strengthening" rel="nofollow">http://en.wikipedia.org/wiki/Key_strengthening</a></p>
<p>I like the global hash and custom hash function. You could however consider the global salt, and custom hashing function. </p>
<p>Great work!</p>
]]></content:encoded>
	</item>
</channel>
</rss>
