Backend Low Level Design 4
About Lesson
Storing passwords as plain text in a database can pose a serious security risk because anyone with access to the database can see them. To address this, we use a technique called hashing to store passwords securely.

Here's how hashing works:

  • When a user creates an account and sets a password, we take that password and convert it into a hash value using a cryptographic algorithm.
  • This hash value, which is a unique string of characters, is then stored in the database instead of the actual password.
  • When the user tries to log in, we take the password they provide, hash it using the same algorithm, and compare the resulting hash with the one stored in the database.
  • If the hashes match, the login is successful.
While hashing solves the security issue of storing plain text passwords, there’s still a concern. If the same password always generates the same hash, attackers could potentially guess passwords by comparing hashes.

Solve the issue using salting

To mitigate this risk, we use techniques like salting (It can be combination of serverId + Time + email with password), which involves adding a random string of characters to each password before hashing it. This ensures that even if two users have the same password, their hashes will be different.