Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Python API Development Fundamentals

You're reading from   Python API Development Fundamentals Develop a full-stack web application with Python and Flask

Arrow left icon
Product type Paperback
Published in Nov 2019
Publisher
ISBN-13 9781838983994
Length 372 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Authors (3):
Arrow left icon
Jack Chan Jack Chan
Author Profile Icon Jack Chan
Jack Chan
Jack Huang Jack Huang
Author Profile Icon Jack Huang
Jack Huang
Ray Chung Ray Chung
Author Profile Icon Ray Chung
Ray Chung
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Your First Step FREE CHAPTER 2. Starting to Build Our Project 3. Manipulating a Database with SQLAlchemy 4. Authentication Services and Security with JWT 5. Object Serialization with marshmallow 6. Email Confirmation 7. Working with Images 8. Pagination, Searching, and Ordering 9. Building More Features 10. Deployment Appendix

Password Hashing

Hashing is a one-way mathematical function. It requires little computing power to convert a plaintext string to its hash value (hashes). However, it will require a huge amount of computing power to retrieve the original string from the hash value (it's almost impossible). Therefore, we call it a one-way function:

Figure 3.13: Workings of the hash function

With this property, a hash function is perfect for a hashing password. We will hash the user's password into hashes before we save it to the database so that it is unrecognizable and irreversible. And next time, when the user logs in, what the platform does is to convert the input the password to its hash value, and then compare that with the hash value stored in the database. That way, we can perform a password comparison without leaking the sensitive password information to others.

Exercise 22: Implement the User Registration Feature and Hash the User's Password

In this...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime