Should I Cleanse Passwords Before Hashing for Database Storage?
When stored the user password hash to the database, developers often consider using technologies such as Escape_String () or Addslashhes () for pre -processing. However, this approach is neither necessary, and may cause hidden safety hazards.
Why not need to transfer the password?
The transfer of passwords before hash will not enhance security. The hash process itself ensures the security storage of the password, regardless of its content. The hash algorithm does not regard specific characters as special characters, and any behavior that trys to clean up the password may be introduced into loopholes. Potential security risks of password pre -processing
Cleaning password may bring additional security challenges:
Unnecessary complexity:
Cleaning unnecessary code, which may introduce errors or vulnerabilities.Compatibility issues:
- If the cleaning method is inconsistent with the method used to store the hash password, the password verification may fail.
- The best practice of password processing
- Do not clean up the password before hash.
Storage the password after the hash as Varchar (255) or Text to ensure that in the future can adapt to different hash methods.
- Cleaning method and its impact examples
- Apply a common cleaning method to such a password like "I'm a" Dessert Topping "& A !"! "
- !" (The space has been removed)
Method | Results |
---|---|
"I'm a" designrt topping "& a | |
"I'm a & quot; dessert topping & quot; & amp; a & lt;! "(Special characters have been encoded) | |
htmlspectchars () | the same as htmleentities () |
addslashes () | "i \ 'm a \" dessert topping \ "& a !" (Already Add transit characters) |
strip_tags () | "I'm a" desated topping "& a!" (Tags have been removed) |
Conclusion
It is unnecessary to transfer the password provided by the user before hash, and it may bring security risks. By following the above best practice, developers can ensure that their passwords are stored safely and efficient.The above is the detailed content of Should I Cleanse Passwords Before Hashing for Database Storage?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

InnoDB's full-text search capabilities are very powerful, which can significantly improve database query efficiency and ability to process large amounts of text data. 1) InnoDB implements full-text search through inverted indexing, supporting basic and advanced search queries. 2) Use MATCH and AGAINST keywords to search, support Boolean mode and phrase search. 3) Optimization methods include using word segmentation technology, periodic rebuilding of indexes and adjusting cache size to improve performance and accuracy.

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

The difference between clustered index and non-clustered index is: 1. Clustered index stores data rows in the index structure, which is suitable for querying by primary key and range. 2. The non-clustered index stores index key values and pointers to data rows, and is suitable for non-primary key column queries.

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.
