Store a password as an identifier (as safely as possible)… since there is no other choice

I have to deal with a place that has some terrible security practices. For example, this place gives people passwords (eg. domain logon on Windows, but paired with their name as the username) that is also used for identification purposes (… Continue reading Store a password as an identifier (as safely as possible)… since there is no other choice

Is it sensible to accept a password + any other random characters for successful authentication?

Supposing a user of my system has set their password to Password123
At the login screen, what would be the security implications of me accepting:
Password123 or
Password1234 or
Password123ABC
Based on the fact they all start with the passw… Continue reading Is it sensible to accept a password + any other random characters for successful authentication?

Does there exist any hashing algorithms suitable for comparing data that is similar but not exact matches?

Does there exist any hashing algorithms suitable for comparing data that is similar but not exact matches?
For example one where similar input data generates a similar hash, with the difference in the hashes being proportional to the diffe… Continue reading Does there exist any hashing algorithms suitable for comparing data that is similar but not exact matches?

Is it possible to find out the encryption algorithm used from hexadecimal hash? [duplicate]

Can we find out the encryption method used if we know what is encrypted inside? Let’s assume there are around 7-digits 22 or 26 codes (passwords ie just decimals) encrypted to 832 characters hexadecimal. Especially, If we know some of thos… Continue reading Is it possible to find out the encryption algorithm used from hexadecimal hash? [duplicate]

Does using a random number of iterations for PKBDF2-SHA256 help if I only have to protect one key used to encrypt a password protecteded file?

I read about Recommended # of iterations when using PBKDF2-SHA256?
I have also read in Why not just use a small but unusual number of hashing rounds? that when there are multiple password to protect, the moment one is cracked the hacker wi… Continue reading Does using a random number of iterations for PKBDF2-SHA256 help if I only have to protect one key used to encrypt a password protecteded file?