What is the best way to create a random hash/string?

105,239

Solution 1

You can use PHP's built-in hashing functions, sha1 and md5. Choose one, not both.

One may think that using both, sha1(md5($pass)) would be a solution. Using both does not make your password more secure, its causes redundant data and does not make much sense.

Take a look at PHP Security Consortium: Password Hashing they give a good article with weaknesses and improving security with hashing.

Nonce stands for "numbers used once". They are used on requests to prevent unauthorized access, they send a secret key and check the key each time your code is used.

You can check out more at PHP NONCE Library from FullThrottle Development

Solution 2

bin2hex(mcrypt_create_iv(22, MCRYPT_DEV_URANDOM));
  1. mcrypt_create_iv will give you a random sequence of bytes.
  2. bin2hex will convert it to ASCII text

Example output:

d2c63a605ae27c13e43e26fe2c97a36c4556846dd3ef

Bare in mind that "best" is a relative term. You have a tradeoff to make between security, uniqueness and speed. The above example is good for 99% of the cases, though if you are dealing with a particularly sensitive data, you might want to read about the difference between MCRYPT_DEV_URANDOM and MCRYPT_DEV_RANDOM.

Finally, there is a RandomLib "for generating random numbers and strings of various strengths".

Notice that so far I have assumed that you are looking to generate a random string, which is not the same as deriving a hash from a value. For the latter, refer to password_hash.

Solution 3

random_bytes() is available as of PHP 7.0 (or use this polyfill for 5.2 through 5.6). It is cryptographically secure (compared to rand() which is not) and can be used in conjunction with bin2hex(), base64_encode(), or any other function that converts binary to a string that's safe for your use case.

As a hexadecimal string

bin2hex() will result in a hexadecimal string that's twice as many characters as the number of random bytes (each hex character represents 4 bits while there are 8 bits in a byte). It will only include characters from abcdef0123456789 and the length will always be an increment of 2 (regex: /^([a-f0-9]{2})*$/).

$random_hex = bin2hex(random_bytes(18));
echo serialize($random_hex);

s:36:"ee438d1d108bd818aa0d525602340e5d7036";

As a base64 string

base64_encode() will result in a string that's about 33% longer than the number of random bytes (each base64 character represents 6 bits while there are 8 bits in a byte). It's length will always be an increment of 4, with = used to pad the end of the string and characters from the following list used to encode the data (excluding whitespace that I added for readability):

abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789
/+

To take full advantage of the space available, it's best to provide an increment of 3 to random_bytes(). The resulting string will match /^([a-zA-Z\/+=]{4})*$/, although = can only appear at the end as = or == and only when a number that is not an increment of 3 is provided to random_bytes().

$random_base64 = base64_encode(random_bytes(18));
echo serialize($random_base64);

s:24:"ttYDDiGPV5K0MXbcfeqAGniH";

Solution 4

Maybe uniqid() is what you need?

uniqid — Generate a unique ID

Solution 5

You can use openssl_random_pseudo_bytes since php 5.3.0 to generate a pseudo random string of bytes. You can use this function and convert it in some way to string using one of these methods:

$bytes = openssl_random_pseudo_bytes(32);
$hash = base64_encode($bytes);

or

$bytes = openssl_random_pseudo_bytes(32);
$hash = bin2hex($bytes);

The first one will generate the shortest string, with numbers, lowercase, uppercase and some special characters (=, +, /). The second alternative will generate hexadecimal numbers (0-9, a-f)

Share:
105,239
Eric Gates
Author by

Eric Gates

Updated on October 25, 2021

Comments

  • Eric Gates
    Eric Gates over 2 years

    What is the best way of generating a hash for the purpose of storing a session? I am looking for a lightweight, portable solution.

  • Eric Gates
    Eric Gates over 14 years
    Right now, I am using uniqid() but I read that using md5 on a uniqid() is not good.
  • Eric Gates
    Eric Gates over 14 years
    Thanks. Im going to look into it
  • Eric Gates
    Eric Gates over 14 years
    I dont use the built in php session functions as I do not have much control over them and maybe unsecure.
  • Tomáš Fejfar
    Tomáš Fejfar almost 12 years
    I can assure you, that they are more secure than any function you would think is secure :)
  • colan
    colan over 8 years
    SHA1 can be broken as well (at least theoretically). See Hash function security summary for details. I'd go with SHA256 or SHA512.
  • 0b10011
    0b10011 almost 8 years
    This does not generate cryptographically secure values as it uses rand().
  • Super Cat
    Super Cat over 7 years
    Just a little PSA: mcrypt_create_iv was deprecated in PHP 7.1.0. Use random_bytes instead.
  • SuperNOVA
    SuperNOVA over 7 years
    Very old thread, but SHA1 is now officially broken! theverge.com/2017/2/23/14712118/…
  • 0b10011
    0b10011 over 6 years
  • Jaden Baptista
    Jaden Baptista almost 4 years
    But... if you're not using it for cryptographically secure values, this works well. I'm just trying to create an identifier for something in my program. +1.
  • Zortext
    Zortext almost 4 years
    Does this method have any advantages over creating a string that uses extra special characters. I use a method randomly generates same length but with larger character combination that have numbers, uppercase, lowercase and specials characters. Which mathematically looks more secure.
  • 0b10011
    0b10011 over 3 years
    @Zortext random_bytes() is built into PHP (so could be faster than anything you create) and can be trusted to be cryptographically secure (compared to rand() which is not). As for bin2hex(), you could convert the binary to something else without too much concern of affecting security (it'll just be more time consuming, but could save a few bytes for the end user). The easiest would probably be base64_encode() which would only ~33% be larger than the binary input. Alternatively, you could use random_int() in a loop that maps to an array of characters.
  • 0b10011
    0b10011 over 3 years
    @Zortext If your concern is security of the session, increase 16 to a number that makes you feel better. 16 bytes is 32 hex characters which means there are 16^32 different possibilities, or 3.4e38 possibilities. So I'd recommend figuring out what the attack surface you're trying to prevent looks like and adjust the number of bytes accordingly. If your concern is storage used by the cookie/session, use base64_encode(), or roll your own using random_int() and an array of more than 64 characters.