Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Essential Cryptography for JavaScript Developers

You're reading from   Essential Cryptography for JavaScript Developers A practical guide to leveraging common cryptographic operations in Node.js and the browser

Arrow left icon
Product type Paperback
Published in Feb 2022
Publisher Packt
ISBN-13 9781801075336
Length 220 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Alessandro Segala Alessandro Segala
Author Profile Icon Alessandro Segala
Alessandro Segala
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Part 1 – Getting Started
2. Chapter 1: Cryptography for Developers FREE CHAPTER 3. Chapter 2: Dealing with Binary and Random Data 4. Part 2 – Using Common Cryptographic Operations with Node.js
5. Chapter 3: File and Password Hashing with Node.js 6. Chapter 4: Symmetric Encryption in Node.js 7. Chapter 5: Using Asymmetric and Hybrid Encryption in Node.js 8. Chapter 6: Digital Signatures with Node.js and Trust 9. Part 3 – Cryptography in the Browser
10. Chapter 7: Introduction to Cryptography in the Browser 11. Chapter 8: Performing Common Cryptographic Operations in the Browser 12. Other Books You May Enjoy

Hashing and key derivation

Hashing was the first operation we covered in this book, in Chapter 3, File and Password Hashing with Node.js. As you will recall, hashing functions can be used for a variety of purposes, including the following:

  • Calculating the checksum (or digest) of a document or file. For this specific scenario, we recommended the use of the SHA-2 family of hashes (including SHA-256, SHA-384, and SHA-512).
  • Hashing passwords before they're stored in a database. In this case, we recommended using algorithms in the Argon2 suite or scrypt.
  • Deriving symmetric encryption keys from low-entropy inputs such as passphrases, as we saw in Chapter 4, Symmetric Encryption in Node.js. For this scenario, we once again recommended using Argon2 or scrypt.

Support for calculating digests with SHA-2 is built into the Web Platform, and at the time of writing, it is one of the only two hashing algorithms that have been standardized and are available in all browsers...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image