我不确定密码散列的工作原理(稍后会实现),但现在需要创建数据库架构.
I'm not sure how password hashing works (will be implementing it later), but need to create database schema now.
我正在考虑将密码限制为 4-20 个字符,但据我所知,加密后的哈希字符串将具有不同的长度.
I'm thinking of limiting passwords to 4-20 characters, but as I understand after encrypting hash string will be of different length.
那么,如何将这些密码存储在数据库中?
So, how to store these passwords in the database?
更新:仅使用散列函数不足以存储密码.您应该阅读Gilles 在此线程上的回答以获得更详细的解释.
Update: Simply using a hash function is not strong enough for storing passwords. You should read the answer from Gilles on this thread for a more detailed explanation.
对于密码,请使用密钥强化哈希算法,例如 Bcrypt 或 Argon2i.例如,在 PHP 中,使用 password_hash() 函数,默认使用 Bcrypt.
For passwords, use a key-strengthening hash algorithm like Bcrypt or Argon2i. For example, in PHP, use the password_hash() function, which uses Bcrypt by default.
$hash = password_hash("rasmuslerdorf", PASSWORD_DEFAULT);
结果是类似于以下的 60 个字符的字符串(但数字会有所不同,因为它生成了唯一的盐).
The result is a 60-character string similar to the following (but the digits will vary, because it generates a unique salt).
$2y$10$.vGA1O9wmRjrwAVXD98HNOgsNpDczlqm3Jq7KnEd1rVAGv3Fykk1a
使用 SQL 数据类型 CHAR(60)
来存储 Bcrypt 哈希的这种编码.请注意,此函数不会编码为一串十六进制数字,因此我们无法轻松地将其解压缩以存储为二进制.
Use the SQL data type CHAR(60)
to store this encoding of a Bcrypt hash. Note this function doesn't encode as a string of hexadecimal digits, so we can't as easily unhex it to store in binary.
其他散列函数仍然有用,但不能用于存储密码,所以我将保留下面的原始答案,写于 2008 年.
Other hash functions still have uses, but not for storing passwords, so I'll keep the original answer below, written in 2008.
这取决于您使用的哈希算法.无论输入如何,散列总是产生相同长度的结果.通常将二进制哈希结果用文本表示为一系列十六进制数字.或者您可以使用 UNHEX()
函数将一串十六进制数字减半.
It depends on the hashing algorithm you use. Hashing always produces a result of the same length, regardless of the input. It is typical to represent the binary hash result in text, as a series of hexadecimal digits. Or you can use the UNHEX()
function to reduce a string of hex digits by half.
截至 2015 年,NIST 建议使用 SHA-256或更高,用于需要互操作性的哈希函数的任何应用程序.但是 NIST 不建议使用这些简单的哈希函数来安全地存储密码.
As of 2015, NIST recommends using SHA-256 or higher for any applications of hash functions requiring interoperability. But NIST does not recommend using these simple hash functions for storing passwords securely.
较小的散列算法有其用途(例如应用程序内部,而不是用于交换),但它们是已知可破解.
Lesser hashing algorithms have their uses (like internal to an application, not for interchange), but they are known to be crackable.
这篇关于用于散列密码字段的数据类型和长度是多少?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持跟版网!