Your password is the first line of defense against unauthorized access to user accounts; however, the best practices for creating and securing them have changed. The National Institute of Standards and Technology (NIST) now prioritizes password length over complexity, emphasizing the use of long passphrases. However, even strong passwords should never be stored in plaintext. Hashing has become a critical security measure to prevent passwords from being fully exposed in the event of a data breach.
Hashing algorithms convert passwords into fixed-length strings of characters that cannot be easily reversed. If attackers gain access to a hashed password database, they still need to crack the hashes before they can use the credentials.
See also: Differences between encryption and hashing
According to The Hacker News, “Because hashing algorithms are one-way functions, the only method to compromise hashed passwords is through brute force techniques. Cyber attackers employ special hardware like GPUs and cracking software (e.g., Hashcat, L0phtcrack, John The Ripper) to execute brute force attacks at scale—typically millions or billions or combinations at a time.” This means that while hashing is a strong security measure, not all hashing algorithms are equally secure. However, the difficulty of cracking a password depends on the hashing algorithm used and the complexity of the password itself.
Despite hashing protections, cybercriminals have developed advanced techniques to crack password hashes. Some of the most common methods include:
See also: HIPAA Compliant Email: The Definitive Guide
Go deeper: Password guidelines by NIST
Password hashing is a security technique that converts passwords into fixed-length strings using cryptographic algorithms. This makes it difficult for attackers to retrieve the original password, even if they access the hashed version.
Hashing protects passwords from being stored in plaintext, reducing the risk of exposure in case of a data breach. Even if an attacker gains access to a hashed password, they must still crack it to obtain the original password.
A strong password is long (at least 12-16 characters), includes a mix of uppercase and lowercase letters, numbers, and special characters, and avoids common words or patterns.
Related: 5 Steps to improve password security in healthcare