on that note, append a certain amount of characters to the beginning and end
of the password before you hash it, and remove them when you retrieve the
password. That what you meant Joe? Thats a good idea.

On Fri, Nov 14, 2008 at 10:46 AM, Joe Enos <[EMAIL PROTECTED]> wrote:

>
> Lots of answers regarding full encryption/decryption, just seems like
> overkill for simple password storage.  Assuming the password is case-
> sensitive, which it definitely should be, I'm with the
> HashPasswordForStoringInConfigFile crowd - it's simple, fast, and
> doesn't require any public/private or symmetric key maintenance.  It
> is also designed so that a password cannot be reverse engineered by
> design, so there's no chance that anyone will ever see your password
> in plain text ever again, without serious effort.
>
> The only thing I'd add is that you should salt your password before
> adding it to the database.  For example, a simple salt would be the
> primary key appended to the beginning or end of the password, or mixed
> in, or something to that effect, as long as it's reproducible at the
> time of the user's login.
>
> On Nov 14, 3:08 am, "karthi keyan" <[EMAIL PROTECTED]> wrote:
> > Hi,
> >
> > I have just designed a registration fom (Windows application) in C#.  I
> am
> > using Ms-access for storing the user information.  I need to store the
> > password entered by the user in a encrypted manner.
> >
> > Can any one help me out / guide me on this?
> >
> > Regards,
> > Karthikeyan
>

Reply via email to