Password Hashing
Converting passwords into fixed-length hashes using algorithms like bcrypt or Argon2 for secure storage.
Technical Detail
Password Hashing performs a handshake establishing an encrypted channel. TLS 1.3 (2018) reduced the handshake from 2 round-trips to 1, improving latency by ~100ms. It eliminated vulnerable algorithms: no RSA key exchange, no CBC mode, no SHA-1. Only five cipher suites remain, all using AEAD (Authenticated Encryption with Associated Data). Certificate verification uses a chain of trust: site certificate → intermediate CA → root CA (pre-installed in browsers/OS). Let's Encrypt automates certificate issuance for free using the ACME protocol.
Example
```
Password hashing comparison:
bcrypt: $2b$12$salt22chars..hash31chars..
Cost factor 12 → ~250ms per hash
argon2id: $argon2id$v=19$m=65536,t=3,p=4$salt$hash
Memory: 64MB, Iterations: 3, Parallelism: 4
Never use: MD5, SHA-256 alone (too fast → brute-forceable)
```