Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. Algorithms
  4. Encryption Algorithm

Encryption Algorithm

Scheduled Pinned Locked Moved Algorithms
questioncsharpdatabasedotnetalgorithms
18 Posts 9 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Offline
    L Offline
    Lost User
    wrote on last edited by
    #1

    Hi there I am encrypting passwords to a database and wish to use the .NET framework to encrypt them. I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? Thanks Dan

    B P E A P 6 Replies Last reply
    0
    • L Lost User

      Hi there I am encrypting passwords to a database and wish to use the .NET framework to encrypt them. I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? Thanks Dan

      B Offline
      B Offline
      Bagaturia david
      wrote on last edited by
      #2

      Hi I am David. The MD5 and SHA-1 are strong et but why risc, use SHA-2 [SHA-256,SHA-384,SHA-512], I recomen SHA-512, I have code of SHA and it is good one, but I forget the author name, if you wont code send me mail to baga_dato@yahoo.com. [C++] and See http://www.csrc.nist.gov/pki/HashWorkshop/NIST%20Statement/Burr_Apr2006.html[^] it will help you. :)

      U 1 Reply Last reply
      0
      • L Lost User

        Hi there I am encrypting passwords to a database and wish to use the .NET framework to encrypt them. I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? Thanks Dan

        P Offline
        P Offline
        priyeshtinku
        wrote on last edited by
        #3

        You can use CRC(Cyclic redundacncy code) but that is for check . i have no idea whether it can use for encryption Subhash jain (Sundyne Technologies pvt. ltd.- 604,B wing,Trade world Lower parel Mumbai)

        U 1 Reply Last reply
        0
        • L Lost User

          Hi there I am encrypting passwords to a database and wish to use the .NET framework to encrypt them. I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? Thanks Dan

          E Offline
          E Offline
          Ed Poore
          wrote on last edited by
          #4

          Depends on how secure you need the password to be, if the server is resonably secure then I don't think (might be wrong) that you'll need to bother with more expensive hashes, if MD5 is slightly compromised but offers considerable performance advantages over SHA512 say then if the server's fairly secure why waste time performing all those extra calculations which are not needed?

          G U 2 Replies Last reply
          0
          • E Ed Poore

            Depends on how secure you need the password to be, if the server is resonably secure then I don't think (might be wrong) that you'll need to bother with more expensive hashes, if MD5 is slightly compromised but offers considerable performance advantages over SHA512 say then if the server's fairly secure why waste time performing all those extra calculations which are not needed?

            G Offline
            G Offline
            Galatei
            wrote on last edited by
            #5

            Hi, It is more than correct... it is pointless to use SHA-2, 512 for Intranet database, knowing that no "elite hackers" are working in your company. I use MD5 for intranet CRM/ASM database and its speed and size is preferred. Regards

            U 1 Reply Last reply
            0
            • L Lost User

              Hi there I am encrypting passwords to a database and wish to use the .NET framework to encrypt them. I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? Thanks Dan

              A Offline
              A Offline
              A A 0
              wrote on last edited by
              #6

              DanB1983 wrote:

              I am encrypting passwords to a database and wish to use the .NET framework to encrypt them.

              Your actually 'hashing' them.

              DanB1983 wrote:

              I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm?

              I am not sure what you think the weakness here is. For databases, you hash the password and store that. I am assuming your getting a hashed password from somewhere else and comparing that to the hash in the database. If this is the case and the hash is being transported securely than I am not sure what the concern is...

              Finding Allah Surah AlHaaqa(The Reality) Surah Qaf Eid Alfitr

              D U 2 Replies Last reply
              0
              • A A A 0

                DanB1983 wrote:

                I am encrypting passwords to a database and wish to use the .NET framework to encrypt them.

                Your actually 'hashing' them.

                DanB1983 wrote:

                I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm?

                I am not sure what you think the weakness here is. For databases, you hash the password and store that. I am assuming your getting a hashed password from somewhere else and comparing that to the hash in the database. If this is the case and the hash is being transported securely than I am not sure what the concern is...

                Finding Allah Surah AlHaaqa(The Reality) Surah Qaf Eid Alfitr

                D Offline
                D Offline
                Dan Neely
                wrote on last edited by
                #7

                A.A. wrote:

                DanB1983 wrote: I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? I am not sure what you think the weakness here is. For databases, you hash the password and store that. I am assuming your getting a hashed password from somewhere else and comparing that to the hash in the database. If this is the case and the hash is being transported securely than I am not sure what the concern is...

                Improved crytopgraphic attack methods and faster CPUs are increasing the likelyhood that they'll become vulnerable to bruteforce attacks in the semi-near future. Better algorythms include the SHA variants with longer bit lengths.

                -- Rules of thumb should not be taken for the whole hand.

                A U 2 Replies Last reply
                0
                • D Dan Neely

                  A.A. wrote:

                  DanB1983 wrote: I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? I am not sure what you think the weakness here is. For databases, you hash the password and store that. I am assuming your getting a hashed password from somewhere else and comparing that to the hash in the database. If this is the case and the hash is being transported securely than I am not sure what the concern is...

                  Improved crytopgraphic attack methods and faster CPUs are increasing the likelyhood that they'll become vulnerable to bruteforce attacks in the semi-near future. Better algorythms include the SHA variants with longer bit lengths.

                  -- Rules of thumb should not be taken for the whole hand.

                  A Offline
                  A Offline
                  A A 0
                  wrote on last edited by
                  #8

                  dan neely wrote:

                  Improved crytopgraphic attack methods and faster CPUs are increasing the likelyhood that they'll become vulnerable to bruteforce attacks in the semi-near future. Better algorythms include the SHA variants with longer bit lengths.

                  I am aware of this (fyi: its not so much as bruteforce as finding collisions in hashes produced by different documents) , I don't see the relevance to his problem though, because the hashes are compared on the DB side anyway.

                  Finding Allah Surah AlHaaqa(The Reality) Surah Qaf Eid Alfitr

                  U 1 Reply Last reply
                  0
                  • L Lost User

                    Hi there I am encrypting passwords to a database and wish to use the .NET framework to encrypt them. I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? Thanks Dan

                    P Offline
                    P Offline
                    PICguy
                    wrote on last edited by
                    #9

                    If you are designing the authentication protocol try this: Rmt: I want authorization Host: Use this 64-bit random number Rmt: append 64 bits to users password and run MD5/SHA-1/whatever and send hash to host Host: run same hash algorithm and compare hashes For more host side security only store hash of password. Rmt response must compute password hash (the one the host has stored) and append the 64 bits to that then run the final hash and send it off to the host. In either case someone monitoring the entire data flow learns nothing about the actual key. Replay attacks are also foiled. A similar approach would work with reasonably smart RFID chips.

                    U 1 Reply Last reply
                    0
                    • A A A 0

                      dan neely wrote:

                      Improved crytopgraphic attack methods and faster CPUs are increasing the likelyhood that they'll become vulnerable to bruteforce attacks in the semi-near future. Better algorythms include the SHA variants with longer bit lengths.

                      I am aware of this (fyi: its not so much as bruteforce as finding collisions in hashes produced by different documents) , I don't see the relevance to his problem though, because the hashes are compared on the DB side anyway.

                      Finding Allah Surah AlHaaqa(The Reality) Surah Qaf Eid Alfitr

                      U Offline
                      U Offline
                      User 12346520
                      wrote on last edited by
                      #10

                      thanks: https://movied.org

                      1 Reply Last reply
                      0
                      • A A A 0

                        DanB1983 wrote:

                        I am encrypting passwords to a database and wish to use the .NET framework to encrypt them.

                        Your actually 'hashing' them.

                        DanB1983 wrote:

                        I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm?

                        I am not sure what you think the weakness here is. For databases, you hash the password and store that. I am assuming your getting a hashed password from somewhere else and comparing that to the hash in the database. If this is the case and the hash is being transported securely than I am not sure what the concern is...

                        Finding Allah Surah AlHaaqa(The Reality) Surah Qaf Eid Alfitr

                        U Offline
                        U Offline
                        User 12346520
                        wrote on last edited by
                        #11

                        thanks: https://movied.org

                        1 Reply Last reply
                        0
                        • P PICguy

                          If you are designing the authentication protocol try this: Rmt: I want authorization Host: Use this 64-bit random number Rmt: append 64 bits to users password and run MD5/SHA-1/whatever and send hash to host Host: run same hash algorithm and compare hashes For more host side security only store hash of password. Rmt response must compute password hash (the one the host has stored) and append the 64 bits to that then run the final hash and send it off to the host. In either case someone monitoring the entire data flow learns nothing about the actual key. Replay attacks are also foiled. A similar approach would work with reasonably smart RFID chips.

                          U Offline
                          U Offline
                          User 12346520
                          wrote on last edited by
                          #12

                          thanks: https://movied.org

                          1 Reply Last reply
                          0
                          • D Dan Neely

                            A.A. wrote:

                            DanB1983 wrote: I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? I am not sure what you think the weakness here is. For databases, you hash the password and store that. I am assuming your getting a hashed password from somewhere else and comparing that to the hash in the database. If this is the case and the hash is being transported securely than I am not sure what the concern is...

                            Improved crytopgraphic attack methods and faster CPUs are increasing the likelyhood that they'll become vulnerable to bruteforce attacks in the semi-near future. Better algorythms include the SHA variants with longer bit lengths.

                            -- Rules of thumb should not be taken for the whole hand.

                            U Offline
                            U Offline
                            User 12346520
                            wrote on last edited by
                            #13

                            thanks: https://movied.org

                            1 Reply Last reply
                            0
                            • E Ed Poore

                              Depends on how secure you need the password to be, if the server is resonably secure then I don't think (might be wrong) that you'll need to bother with more expensive hashes, if MD5 is slightly compromised but offers considerable performance advantages over SHA512 say then if the server's fairly secure why waste time performing all those extra calculations which are not needed?

                              U Offline
                              U Offline
                              User 12346520
                              wrote on last edited by
                              #14

                              thanks: https://movied.org

                              1 Reply Last reply
                              0
                              • G Galatei

                                Hi, It is more than correct... it is pointless to use SHA-2, 512 for Intranet database, knowing that no "elite hackers" are working in your company. I use MD5 for intranet CRM/ASM database and its speed and size is preferred. Regards

                                U Offline
                                U Offline
                                User 12346520
                                wrote on last edited by
                                #15

                                thanks: https://movied.org

                                1 Reply Last reply
                                0
                                • B Bagaturia david

                                  Hi I am David. The MD5 and SHA-1 are strong et but why risc, use SHA-2 [SHA-256,SHA-384,SHA-512], I recomen SHA-512, I have code of SHA and it is good one, but I forget the author name, if you wont code send me mail to baga_dato@yahoo.com. [C++] and See http://www.csrc.nist.gov/pki/HashWorkshop/NIST%20Statement/Burr_Apr2006.html[^] it will help you. :)

                                  U Offline
                                  U Offline
                                  User 12346520
                                  wrote on last edited by
                                  #16

                                  thanks: https://movied.org

                                  1 Reply Last reply
                                  0
                                  • L Lost User

                                    Hi there I am encrypting passwords to a database and wish to use the .NET framework to encrypt them. I know that MD5 and SHA-1 have been compromised. However for the purpose of passwords in a database how weak are they? If they are too weak what is another decent algorithm? Thanks Dan

                                    U Offline
                                    U Offline
                                    User 12346520
                                    wrote on last edited by
                                    #17

                                    thanks: https://movied.org

                                    1 Reply Last reply
                                    0
                                    • P priyeshtinku

                                      You can use CRC(Cyclic redundacncy code) but that is for check . i have no idea whether it can use for encryption Subhash jain (Sundyne Technologies pvt. ltd.- 604,B wing,Trade world Lower parel Mumbai)

                                      U Offline
                                      U Offline
                                      User 12346520
                                      wrote on last edited by
                                      #18

                                      thanks: https://movied.org

                                      1 Reply Last reply
                                      0
                                      Reply
                                      • Reply as topic
                                      Log in to reply
                                      • Oldest to Newest
                                      • Newest to Oldest
                                      • Most Votes


                                      • Login

                                      • Don't have an account? Register

                                      • Login or register to search.
                                      • First post
                                        Last post
                                      0
                                      • Categories
                                      • Recent
                                      • Tags
                                      • Popular
                                      • World
                                      • Users
                                      • Groups