• Blog
  • Search results shown for:

"hashing"

8 of 8 results

identity & security

Jan 17, 2025 • 13 min read

Adding Salt to Hashing: A Better Way to Store Passwords

A salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and mitigate password attacks like hash tables

Dan Arias

identity & security

Mar 27, 2024 • 12 min read

Post-Quantum Cryptography: Preparing for the Future of Security

Quantum computers may not be here yet, but we still need to prepare for them.

Jon Elliott

developers

Mar 2, 2022 • 9 min read

Encoding, Encryption, and Hashing

Encoding, Encryption, and Hashing have different goals and shouldn't be confused. Learn the differences.

Andrea Chiarelli

identity & security

Feb 25, 2021 • 17 min read

Hashing in Action: Understanding bcrypt

The bcrypt hashing function allows us to build a password security platform that scales with computation power and always hashes every password with a salt.

Dan Arias

identity & security

Sep 30, 2019 • 16 min read

Hashing Passwords: One-Way Road to Security

A strong password storage strategy is critical to mitigating data breaches that put the reputation of any organization in danger. Hashing is the foundation of secure password storage.

Dan Arias

identity & security

Aug 21, 2019 • 16 min read

How Secure Are Encryption, Hashing, Encoding and Obfuscation?

Cryptography has three key properties: confidentiality, integrity, and authenticity. Let’s learn which of these apply to encryption, hashing, encoding, and obfuscation.

Multiple authors

identity & security

Dec 19, 2018 • 5 min read

10 Most-Popular Identity Posts in 2018

Our 10 most-popular identity posts in 2018 ranging from auth standards to web authentication.

Ramiro Nunez Dosio

identity & security

May 11, 2017 • 7 min read

Data Breaches by the Numbers

By failing to plan for data breaches, you leave yourself vulnerable to inevitable attacks

Diego Poza