Remove Consumer Services Remove Examples Remove Passwords Remove Presentation
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Four and a half years ago now, I rolled out version 2 of HIBP's Pwned Passwords that implemented a really cool k-anonymity model courtesy of the brains at Cloudflare. SHA-1 is Just Fine for k-Anonymity Let's begin with the actual problem SHA-1 presents. The other problem relates to how SHA-1 is used for integrity checks.

Passwords 122