Information Security Lecture 6
Information Security Lecture 6
Lecture 6
Hira Zaman
Attock Campus
Hashing in Information
Security
- PBKDF2
- bcrypt
- Argon2 (Recommended)
Best Practices for Secure
Hashing
• Use strong hash functions (SHA-256, SHA-3)