![]() |
2010-12-21
, 06:40
|
Posts: 540 |
Thanked: 288 times |
Joined on Sep 2009
|
#2
|
The Following User Says Thank You to rambo For This Useful Post: | ||
![]() |
2010-12-21
, 06:41
|
Posts: 840 |
Thanked: 823 times |
Joined on Nov 2009
|
#3
|
![]() |
2010-12-21
, 07:07
|
Posts: 7 |
Thanked: 0 times |
Joined on Oct 2010
@ Planet Earth
|
#4
|
![]() |
2010-12-21
, 07:27
|
Posts: 840 |
Thanked: 823 times |
Joined on Nov 2009
|
#5
|
1. I let user to enter a password (key) which will encrypt the source file.
2. But if I store the key as such in the file system, others can read it. So we generally gets the hash out of them and stores the hash. When user enters a pass, the hash is computed and matched.
3. But the problem is if I replace the hash that's stored in the filesystem with my own hash, it will still fail to decrypt. But what if some malicious person just delete the hash file that I saved. So how can I check the key the next time when I enter my pass? The hash is gone, and my whole files are encrypted.
So how to securely store the hash ?
Or is there any better method ?