Part seven of the series detailing the OWASP top 10 web application vulnerabilities with a focus on password hashing. (See intro) "Insecure cryptographic storage" relates to a number of aspects, but I think that it can be broken down to two main areas: Encryption and Hashing. As these are similar in some respects and are often both used together, there's a bit of confusion around what they are. Firstly, encryption uses a mathematical formula to transform human readable data into an unreadable form by means of a key. Often...

Twitter Delicious Facebook Digg Stumbleupon Favorites More