If you liked this video, consider checking out codedamn.com - an interactive way to learn coding. Become a stellar full-stack developer learning to code interactively: cdm.sh/fullstack
@akashdash60232 жыл бұрын
random salt + hash, with a cpu intensive hash function like bcrypt
@Anonymous-gt8zn2 жыл бұрын
This video is amazing.. now I understood why bcrypt is soo popular..
@venkateshyadav368 Жыл бұрын
Nice video great Content
@KeffelewAssefa2 жыл бұрын
Thank you
@hassaanraheem562 жыл бұрын
But in generally top mnc's uses combo of multiple hash functions.
@smaranh2 жыл бұрын
Keep making these AWESOME videos
@elamandeep2 жыл бұрын
bycrypt hashing algorithm or use auth0
@bramlachat25152 жыл бұрын
I watched this video till the end!
@neontuts56372 жыл бұрын
Nice video sir. Please can you make a video on Bcrypt. How to use in MERN Stack etc.
@rajeev31472 жыл бұрын
i watched this video till the end!
@nicetomeetugaming70242 жыл бұрын
Good video sir!
@vijaychauhan.91342 жыл бұрын
Very nice video 👍👍
@guddetiajaymanikanta2 жыл бұрын
You are awesome.
@suryapratimpaul2 жыл бұрын
I watched the video till the end and also watched ads.
@vijaychauhan.91342 жыл бұрын
Very nice
@thegreatprogrammer59372 жыл бұрын
I learnt today that even your own colleagues or employees can also do malicious stuff to your own product!
@aswincg58952 жыл бұрын
Do a video on Remix. Seeing many tweets about remix these days
@2206arnab2 жыл бұрын
I’m thinking, what would be pros and cons of doing hashing in rounds like DES or AES? For example, if I MD5() a value for K times(say 8 or 16), wouldn’t that be extremely hard to break via brute force and faster than bcrypt() as well? Just thinking out loud. Not sure if it’s in the right track.
@akhandpatel48732 жыл бұрын
Adding multiple rounds, increases the complexity but that can be handled by using a lookup table. It is easier to create a lookup table in case of unsalted md5.
@2206arnab2 жыл бұрын
@@akhandpatel4873 Yes it would increase the complexity, but isn’t bcrypt doing that as well? And coming to salts, what if someone encrypts the salt or maybe use multiple salts in multiple rounds of hashing?
@akhandpatel48732 жыл бұрын
You maybe right but in case of md5 the output range is 64 bits and in bcrypt it is much larger than that, and moreover in case of bcrypt, the calculation doesn't increase linearly with rounnd but rather exponentially. But i wouldn't say that rehashing md5 hashes would be worthless, but not as useful as bcrypt
@2206arnab2 жыл бұрын
@@akhandpatel4873 understood. Thanks. I’ve never came across this kind of use case in real life, only studied them back in college. I usually go the OAuth way. But, yeah I’ll check on bcrypt a bit more. Thanks!
@vijaychauhan.91342 жыл бұрын
Super video 💯💯🤣🙂🙂😊👍😊😊👌
@ujjwalsaxena64692 жыл бұрын
But wouldn't using bycript to store password also increase the time taken by to authenticate the user (while checking password)?
@codedamn2 жыл бұрын
It’s 100% worth it. It’s like saying we should not use https because tls handshake takes time
@ujjwalsaxena64692 жыл бұрын
@@codedamn Thanks :)
@tibzdankan2 жыл бұрын
I watched this video till the end
@chatarsinghchundawat42392 жыл бұрын
I watched this video till the end.
@pranavbhat292 жыл бұрын
6:04 Should we also not guarantee that the hash function has as less collisions as possible? Or else two users might accidently have the same hash for their two different passwords
@shadestorm39952 жыл бұрын
why should that matter aslong as the user_id is different ?
@neuideas2 жыл бұрын
Preventing hash collisions is one of the first things hash developers focus on. If collisions are easy, then it's not a valid hash algorithm. At best, it's a fancy checksum.
@pastuh2 жыл бұрын
obvious social logins is best. Another way just send login confirmation to email
@JarppaGuru2 жыл бұрын
1:50 it wont matter if ALL DATA is encrypted it random order based on something and multiple times. hacker cant know and hashes are pointless. hash multiple time and between new encryption reverse order and hash that hash with new method. hacker cant know there becouse too many variables, but developers are stupid. it only take millisend hash hash reverse hash reverse plit in midle hash lol but million years crack even know correct order
@gofudgeyourselves90242 жыл бұрын
Ajinkya rahane
@yadneshkhode30912 жыл бұрын
1 month pehle bana diya hota video toh interview clear ho jata
@gmkhussain2 жыл бұрын
09:54 I am happy😊 as you *shout out me* 😋 although your hardwork is priceless but still it will help you as well as us.