What is the best way to create a random hash/string?
Solution 1
You can use PHP's built-in hashing functions, sha1
and md5
. Choose one, not both.
One may think that using both, sha1(md5($pass))
would be a solution. Using both does not make your password more secure, its causes redundant data and does not make much sense.
Take a look at PHP Security Consortium: Password Hashing they give a good article with weaknesses and improving security with hashing.
Nonce stands for "numbers used once". They are used on requests to prevent unauthorized access, they send a secret key and check the key each time your code is used.
You can check out more at PHP NONCE Library from FullThrottle Development
Solution 2
bin2hex(mcrypt_create_iv(22, MCRYPT_DEV_URANDOM));
- mcrypt_create_iv will give you a random sequence of bytes.
- bin2hex will convert it to ASCII text
Example output:
d2c63a605ae27c13e43e26fe2c97a36c4556846dd3ef
Bare in mind that "best" is a relative term. You have a tradeoff to make between security, uniqueness and speed. The above example is good for 99% of the cases, though if you are dealing with a particularly sensitive data, you might want to read about the difference between MCRYPT_DEV_URANDOM and MCRYPT_DEV_RANDOM.
Finally, there is a RandomLib "for generating random numbers and strings of various strengths".
Notice that so far I have assumed that you are looking to generate a random string, which is not the same as deriving a hash from a value. For the latter, refer to password_hash.
Solution 3
random_bytes()
is available as of PHP 7.0 (or use this polyfill for 5.2 through 5.6). It is cryptographically secure (compared to rand()
which is not) and can be used in conjunction with bin2hex()
, base64_encode()
, or any other function that converts binary to a string that's safe for your use case.
As a hexadecimal string
bin2hex()
will result in a hexadecimal string that's twice as many characters as the number of random bytes (each hex character represents 4 bits while there are 8 bits in a byte). It will only include characters from abcdef0123456789
and the length will always be an increment of 2 (regex: /^([a-f0-9]{2})*$/
).
$random_hex = bin2hex(random_bytes(18));
echo serialize($random_hex);
s:36:"ee438d1d108bd818aa0d525602340e5d7036";
As a base64 string
base64_encode()
will result in a string that's about 33% longer than the number of random bytes (each base64 character represents 6 bits while there are 8 bits in a byte). It's length will always be an increment of 4, with =
used to pad the end of the string and characters from the following list used to encode the data (excluding whitespace that I added for readability):
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789
/+
To take full advantage of the space available, it's best to provide an increment of 3 to random_bytes()
. The resulting string will match /^([a-zA-Z\/+=]{4})*$/
, although =
can only appear at the end as =
or ==
and only when a number that is not an increment of 3 is provided to random_bytes()
.
$random_base64 = base64_encode(random_bytes(18));
echo serialize($random_base64);
s:24:"ttYDDiGPV5K0MXbcfeqAGniH";
Solution 4
Maybe uniqid() is what you need?
Solution 5
You can use openssl_random_pseudo_bytes since php 5.3.0 to generate a pseudo random string of bytes. You can use this function and convert it in some way to string using one of these methods:
$bytes = openssl_random_pseudo_bytes(32);
$hash = base64_encode($bytes);
or
$bytes = openssl_random_pseudo_bytes(32);
$hash = bin2hex($bytes);
The first one will generate the shortest string, with numbers, lowercase, uppercase and some special characters (=, +, /). The second alternative will generate hexadecimal numbers (0-9, a-f)
Eric Gates
Updated on October 25, 2021Comments
-
Eric Gates over 2 years
What is the best way of generating a hash for the purpose of storing a session? I am looking for a lightweight, portable solution.
-
Eric Gates over 14 yearsRight now, I am using uniqid() but I read that using md5 on a uniqid() is not good.
-
Eric Gates over 14 yearsThanks. Im going to look into it
-
Eric Gates over 14 yearsI dont use the built in php session functions as I do not have much control over them and maybe unsecure.
-
Tomáš Fejfar almost 12 yearsI can assure you, that they are more secure than any function you would think is secure :)
-
colan over 8 yearsSHA1 can be broken as well (at least theoretically). See Hash function security summary for details. I'd go with SHA256 or SHA512.
-
0b10011 almost 8 yearsThis does not generate cryptographically secure values as it uses
rand()
. -
Super Cat over 7 yearsJust a little PSA:
mcrypt_create_iv
was deprecated in PHP 7.1.0. Userandom_bytes
instead. -
SuperNOVA over 7 yearsVery old thread, but SHA1 is now officially broken! theverge.com/2017/2/23/14712118/…
-
0b10011 over 6 yearsRemoved in PHP 7.2.0: secure.php.net/manual/en/intro.mcrypt.php
-
Jaden Baptista almost 4 yearsBut... if you're not using it for cryptographically secure values, this works well. I'm just trying to create an identifier for something in my program. +1.
-
Zortext almost 4 yearsDoes this method have any advantages over creating a string that uses extra special characters. I use a method randomly generates same length but with larger character combination that have numbers, uppercase, lowercase and specials characters. Which mathematically looks more secure.
-
0b10011 over 3 years@Zortext
random_bytes()
is built into PHP (so could be faster than anything you create) and can be trusted to be cryptographically secure (compared torand()
which is not). As forbin2hex()
, you could convert the binary to something else without too much concern of affecting security (it'll just be more time consuming, but could save a few bytes for the end user). The easiest would probably bebase64_encode()
which would only ~33% be larger than the binary input. Alternatively, you could userandom_int()
in a loop that maps to an array of characters. -
0b10011 over 3 years@Zortext If your concern is security of the session, increase
16
to a number that makes you feel better. 16 bytes is 32 hex characters which means there are16^32
different possibilities, or 3.4e38 possibilities. So I'd recommend figuring out what the attack surface you're trying to prevent looks like and adjust the number of bytes accordingly. If your concern is storage used by the cookie/session, usebase64_encode()
, or roll your own usingrandom_int()
and an array of more than 64 characters.