How can the hashed password be decrypted?

I have used SHA1 algorithm of salt technique to hash password in my site. Is there any way to decrypt the password and recover the original?

Here is Solutions:

We have many solutions to this problem, But we recommend you to use the first solution because it is tested & true solution that will 100% work for you.

Solution 1

Hashing is not encrypting/de-crypting.

When we hash something, we derive a number (or sequence of characters) from a particular set of bytes so that the same set of bytes produces the same hash code. This is a one-way process and we cannot go back.

With encryption we use algorithms that turn a sequence of bytes in to something that no longer resembles the original content, however if we know how it was encrypted, we can decrypt it.

Hashing is useful when we don’t need to know what the original content was. A good example of this is passwords (that you mention in your post). We store the hashed version (with salt) in the database. When the user comes to log in again, we hash the password they entered. If the two hashes match, then it must be the same password. But at no point have we revealed what the password actually is and it is not stored in plain-text within the database.

Solution 2

You can’t do that, SHA1 is a hashing algorithm:
It always go from plain text to a hash signature.

If you want to be able to go both ways you need to look at symmetric algorithms.

Take a look here: http://msdn.microsoft.com/en-us/library/system.security.cryptography(v=vs.110).aspx

Note: Use and implement solution 1 because this method fully tested our system.
Thank you 🙂

All methods was sourced from stackoverflow.com or stackexchange.com, is licensed under cc by-sa 2.5, cc by-sa 3.0 and cc by-sa 4.0

Leave a Reply