How do I decrypt a password from database

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • nithyasunil
    New Member
    • May 2007
    • 1

    How do I decrypt a password from database

    How do I decrypt a password from the database?
    Last edited by pbmods; May 17 '07, 10:59 PM. Reason: Changed the post so that it is actually phrased in the form of a question. The judges would also have accepted, "Can I decrypt a password from the database?'
  • code green
    Recognized Expert Top Contributor
    • Mar 2007
    • 1726

    #2
    You can't decrypt. You have to store a copy of the crypted word in the database when it is created. Then compare the two encrypted versions.

    Comment

    • Motoma
      Recognized Expert Specialist
      • Jan 2007
      • 3236

      #3
      Originally posted by code green
      You can't decrypt. You have to store a copy of the crypted word in the database when it is created. Then compare the two encrypted versions.
      This is not necessarily true. The Original Poster did not give us enough information to give an answer to this question.

      Comment

      • Motoma
        Recognized Expert Specialist
        • Jan 2007
        • 3236

        #4
        Originally posted by nithyasunil
        hpw to decrypt a password from database
        Often, passwords are HASHED before being put into a database, as opposed to ENCRYPTED. The difference is that a hashing function has a one to many relationship between the original text and the result text. This makes it impossible to directly gather the original text when given the hash. MD5 and SHA1 are two such hashing functions.

        On the other hand, if you know the passwords were encrypted with a method such as DES or RSA, you will need to know some specific information about the way it was encrypted, namely a private key.

        Comment

        • code green
          Recognized Expert Top Contributor
          • Mar 2007
          • 1726

          #5
          How true. I maybe jumped the gun trying to GUESS the problem

          Comment

          Working...