PASSWORD SALTING
To protect the password, salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and to mitigate password attacks like rainbow tables.
There are various ways to secure passwords. Mostly used ones are Cryptographic hash functions, which implements hashing. Hashing is the process of adding some kind of text to our already existing password and thereby changing the size and format of the password being stored. Hash functions like SHA256, SHA512, RipeMD, MD5, and WHIRLPOOL are cryptographic hash functions for this purpose. There are different hash functions based on the purpose of the user, it can also be used to implement data structure functionality.
By using the cryptographic hash function, it will protect the password of users. This is far from the truth. There are many ways to recover passwords from plain hashes very quickly. There are several easy-to-implement techniques that make these “attacks” much less effective. Encoding and decoding techniques can also be used to secure our passwords. Example, Base64Encoding Technique. Any kind of hashing techniques can be used to protect data, which will purely depend on whom it will implement.
Cryptographically secure
The working of Base64Encoder as follows, when the user enters their password. A specific random key (salt) generated by
Password salting is the process of securing password hashes from something called a Rainbow Table attack. The problem with non-salted passwords is that they do not have a property that is unique to themselves – that is, if someone had a precomputed rainbow table of common password hashes, they could easily compare them to a database and see who had used which common password. A rainbow table is a pre-generated list of hash inputs to outputs, to quickly be able to look up an input, from its hash. However, a rainbow table attack is only possible because the output of a hash function is always the same with the same input.