Web and Cryptography: a primer for Php developers

On haveibeenpwned.com you can check if your account has been cracked over the years on many on line services. In this example, the (in)famous Linkedin data breach exposed password stored with a weak cryptographic hash, something that definitely shouldn’t happen.
  1. hashing passwords
  2. crypting and decrypting data
  3. data at rest encryption to protect your database tables

1. Hashing passwords

2. Encrypting and decrypting data

3. Data at rest encryption

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Simone Ricci

Simone Ricci

I work as a full stack web developer in the company that I co-founded. I live in Turin, Italy. I love bikes, Sardinia, cameras, mountains, free software.