Why We Hash Passwords

This article has been indexed from DZone Security Zone

This article, an excerpt from my book “Full Stack Python Security“, examines the underlying concept behind every authentication scheme: password hashing. I’ll teach you how and why authentication systems hash passwords. Along the way you’ll learn about salting and key derivation functions. I’ll also demonstrate how to apply these concepts using a Django application server.

Every authentication system has to store some representation of your password. You must reproduce your password in response to a username and password challenge when you authenticate. The system compares your reproduced password with the stored representation of it as a means of authenticating you.

Read the original article: Why We Hash Passwords