Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity
Troy Hunt
JUNE 30, 2022
Hashing algorithms provide an efficient means of comparing two files and establishing if their contents is the same due to the deterministic nature of the algorithm (the same input always produces the same output). For a modern day reference of how you should be storing passwords, check out OWASP's Password Storage Cheat Sheet.
Let's personalize your content