First page Back Continue Last page Overview Graphics
Applications - continued
- When a user logs in, we hash the password they give us and compare it to the hash in the password or shadow file.
- Can the password still be recovered? That depends.
Generating encryption keys
- For some reason, users can't remember 128bit numbers.
- a hash can be used to convert a password/phrase into a fixed length 128bit key.