# Web security essentials - Password storage 🔑

Passwords are a nightmare. If you can offload password storage to a third party provider, you should totally do that. This is not possible a lot of the time (especially if you want to keep your users data to yourself), and in cases like this, you would have to bite the bullet and manage passwords yourself.

This post will explain password storage in baby steps, so that we can understand why passwords are stored the way they are, and why it’s not as straightforward as it seems.

## Method #1 - Just store it like anything else

I can hear you say “What’s all the fuss about! Why can’t I just store the password like any other data?“.

In this case you could have a database with a table consisting of username and password columns, with passwords stored like this :

The problem : This is horribly insecure. Something as simple as a system administrator keeping his laptop open by mistake could lead to your users passwords being compromised.

Side note : If any website you go to emails you your actual password in case you forgot it, they probably store your password this way. You should run away, and fast.

## Method #2 - Encryption

Ok, so maybe storing a password directly isn’t such a good idea. Lets try giving it some form of encryption to make it a little more secure.

As an example, let’s replace every letter of the password with the next letter in the alphabet.

john nzbxftpnfqbttxpse

Looks good. Now even if you someone looks at this table they wouldn’t know the actual password. And if we want to log someone in, all we have to do is unencrypt this password and compare it with the password entered by the user on login.

The problem : There is still someone who has knowledge of the passwords in the system : the person who wrote the encryption algorithm. In our case, we know that the password is formed by incrementing each letter to the next, so retrieving a users password is entirely possible for us. As long as anyone can find out a users password, the system is never truly secure. You could come up with an algorithm as complex as you’d like, but as long as it’s reversible, its as easy to crack as this one.

## Method #3 - Irreversible encryption

Instead of using your own derived encryption algorithm, you should use an established hashing algorithm like md5 or sha-1. These hashing algorithms cannot be reversed in theory.

This means that just because we know the md5 hash of a word, doesn’t mean we can find out what that word is if we only have its md5 hash.

Lets revise our table to include the md5 hash of the password.

Now, even if we see this table, it would be impossible for us to find out the original password from this hash. Now, if we want to log a user in, we have to hash the entered password and compare it to the hash in the table. This is perfect! … or is it?

The problem : Turns out people are more similar than you think, and as a result you will find many passwords which are just common words and phrases. Many websites like this one have lookup tables of md5 hashes of common words. This means that if your user set a common word as his password, it can be easily looked up and cracked.

To prove my point, here are some md5 hashes of common words :

• lettuce : 8cbd191432b5f52b48497313f966a4f8
• cat : d077f244def8a70e5ea758bd8352fcd8
• bottle : 3a385ac07dcec4dde1a4ca47a9802c96

Now go here and enter these hashes to reverse them and realize your whole life was a lie.

## Method #4 Irreversible encryption + salt

We know that look up tables exist for common words, and we also know that we can’t trust our users to not use common words. Many websites try to prevent this by forcing users to enter a combination of letters, numbers and special characters (and to be honest, it’s really irritating). A better alternative is to salt the users password.

“Salt” is a fancy term that means to add a random string of letters and numbers to a users password, and then hash it. This more or less guarantees that the word is unique and unconventional, and therefore cannot be part of a lookup table.

The final output you see has two \$ symbols, between which the salt used to generate the rest of the hash lies. This is so that we can compare this hash with a user entered password.

If a user enters a password on login, in order to compare it to our existing tables of salted passwords, we first read the salt from the password we want to compare it to (the part between the $symbols) append the salt to the entered password, hash the result, and compare the output of this hash to the part on the right of the second$ symbol.

Congratulations! You now have a decently secure form of password storage. You are now in a situation where no one, not even you, can ever find out your users passwords.

Side note : this is also why almost all websites ask you to reset or create a new password, rather than reveal the password to you directly.

If you still feel that your password is not secure enough (and for some cases you should), you finally arrive at :

## Method #5 Repeated hashing

Remember what we did in method #4? Now, take the result, perform method #4 on it… now take that result and perform method #4 on it again, and again.

Normally this is done an arbitrary number of times. If you thought reversing a hash is hard, try doing it many times over!

The steps to compare two passwords involves repeatedly hashing the entered password the same number of times and comparing the result to the stored hash.