What password hashing algorithms are popular among sites that have been hacked?
Study: Your Password Complexity Requirements are Worthless
Date: September 25 2014 Number of unique leaked password dumps identified as using a specific hashing algorithm, collected by KoreLogic over a six month period in 2014 (n=1,365):
PasswordResearch.com Comment: For above the p = plaintext password, s = salt. This identifies how the chosen algorithm(s) are specifically used to hash the password and salt. If not otherwise specified the hash is applied only to the password (p). Note that we removed what appeared to be duplicate entries for "crypt-blowfish" and "ntlm" from the original slide. <-- Back to Authentication Statistic Index |