Using a constant "secret salt" a bad idea, because identical passwords generate identical hashes. This makes attacks much easier than they should be: The bad guy sets his password to a common trivial password, say "123456", reads the login names and hashes from the DB, and instantly knows all logins that use this password simply because they have the same hash value as his account. Repeat for a long list of weak passwords and you will get a good list of login names and passwords.
It's less bad than storing the salts with the hashes.
And any salting process worth it ... um ... salt, would incorporate the userid into the hash along with the pass-phrase, which completely negates that problem.
In reply to Re^3: SaltedDigest Salt?
by BrowserUk
in thread SaltedDigest Salt?
by packetstormer
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |