ByteByteGo Logo
password security data protection

Storing Passwords Safely: A Comprehensive Guide

Learn how to securely store and validate passwords in your database.

Things NOT to do

  • Storing passwords in plain text is not a good idea because anyone with internal access can see them.

  • Storing password hashes directly is not sufficient because it is prone to precomputation attacks, such as rainbow tables.

  • To mitigate precomputation attacks, we salt the passwords.

What is salt?

According to OWASP guidelines, β€œa salt is a unique, randomly generated string that is added to each password as part of the hashing process”.

How to store a password and salt?

  1. A salt is not meant to be secret and it can be stored in plain text in the database. It is used to ensure the hash result is unique to each password.

  2. The password can be stored in the database using the following format: 𝘩𝘒𝘴𝘩( 𝘱𝘒𝘴𝘴𝘸𝘰𝘳π˜₯ + 𝘴𝘒𝘭𝘡).

How to validate a password?

To validate a password, it can go through the following process:

  1. A client enters the password.

  2. The system fetches the corresponding salt from the database.

  3. The system appends the salt to the password and hashes it. Let’s call the hashed value H1.

  4. The system compares H1 and H2, where H2 is the hash stored in the database. If they are the same, the password is valid.