473,408 Members | 2,839 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,408 software developers and data experts.

Implementing newer Password Hashing Algorithms

Hello-

I'm creating a user log in form in VBA for an Access Database project I'm working on. I was fortunate enough to be able to implement SHA256 Hashing using the code found on this site (https://bytes.com/topic/access/insights/906938-sha2-cryptographic-hash-algorithm-vba-vbscript).

However, I was wondering if anyone had used, or knew of any, source code for newer/slower password algorithms such as BCrypt, SCrypt, PBKDF2, etc.

I've been looking around online for implementations of some of these functions in VBA, and haven't had much success.
I'm considering trying to reverse engineer one of the available algorithms and try to port it to VBA, but I'd like to avoid doing this if possible (mostly because I don't think I'd be too successful).

Thank you!
Sep 1 '17 #1

✓ answered by NeoPa

Most people use the account that's logged on to determine who the user is. It's not always appropriate but when it is then it's a far more reliable way of handling security than building your own.

4 3294
NeoPa
32,556 Expert Mod 16PB
If I'm honest it's only Rabbit that deals with such things here.

The rest of us use his work ;-)
Sep 2 '17 #2
Rabbit
12,516 Expert Mod 8TB
I ported from existing C or Java code I found on the web. Unfortunately I haven't looked at those other algorithms you mentioned.
Sep 5 '17 #3
I understand.
I'm taking a look at the algorithms to see if I can do it.

I'm still trying to tear BCrypt apart to see how it works, since even if I can't port it, I'd still like to understand it.

Interestingly enough, I haven't found the wealth of information I was expecting.
I did find a fairly in depth explanation of SCrypt, so I'm taking a look at that.

Its probably overkill since ultimately the log in passwords will be stored in an Access Database Backend that will be encrypted by a password and store on a file share with restricted permissions.

But I like the idea of proper overkill.

I'll post back if I come up with anything of note.
Sep 8 '17 #4
NeoPa
32,556 Expert Mod 16PB
Most people use the account that's logged on to determine who the user is. It's not always appropriate but when it is then it's a far more reliable way of handling security than building your own.
Sep 9 '17 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

4
by: chuy | last post by:
Is there a way to recover a lost password in Mysql 4.1. I have seen many articles and howto's on how to kill the Mysql process and then restart using skip grant tables option. I am not trying to...
3
by: Priya Ghate | last post by:
Hi, I am looking for resources (website links/documentation) to some good hashing algorithms. Basically Hashing algorithms that cater to a range of intergers/ a range of IP addresses. Help...
11
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice...
4
by: Guadala Harry | last post by:
Looking for recommendations for *credible* information on implementing password hashing and salting. I did my own search and came up with a bunch of somewhat contradictory often...
0
by: Brian | last post by:
Thanks for your time. When a hashed password is stored in a db - how should it appear in the table? In the MySQL table I'm using to store username and passwords, it appears as system.byte. ...
9
by: neokosmos | last post by:
This may only be tangentially related to Python, but since I am coding a password authentication system in Python, I thought I would ask here. In Linux (and presumably other *NIX systems that...
6
by: Charleees | last post by:
Hi all, I have a Login Page whrere all Functionalities such as validations are Done in Client Side... I have to Implement Remember My Mail Id and PAss Word Functionality also in Client side.....
5
by: =?Utf-8?B?Sm9l?= | last post by:
I need to store a password for use later in my web app and I would like to use FormsAuthentication.HashPasswordForStoringInConfigFile. The question is, once it's hashed and stored, do I need to...
6
by: kmd | last post by:
Hi I make simple script and ive made admin panel. Login and password are in config.php file. Im using form to log in. And my question is: Is security of this code high or low or medium? :) In...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.