In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
13 KB (1,533 words) - 12:18, 19 January 2025
In cryptography, a pepper is a secret added to an input such as a password during hashing with a cryptographic hash function. This value differs from...
9 KB (1,161 words) - 14:26, 23 December 2024
reasons Salt (cryptography), a method to secure passwords Salted bomb, a nuclear weapon specifically engineered to enhance residual radioactivity Salting (confidence...
2 KB (253 words) - 19:22, 31 December 2024
In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number...
7 KB (881 words) - 16:27, 15 April 2025
pepper noise, a form of noise typically seen on images Salt (cryptography) and pepper (cryptography), additional input to a hashing function that acts as...
2 KB (250 words) - 00:50, 15 March 2025
In cryptography, padding is any of a number of distinct practices which all include adding data to the beginning, middle, or end of a message prior to...
23 KB (3,307 words) - 14:54, 5 February 2025
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
49 KB (6,299 words) - 20:13, 4 May 2025
Password algorithm Cryptographic hash function Hash collision Hash-based cryptography Cryptographic nonce Salt (cryptography) Cryptographic strength Block...
18 KB (1,725 words) - 19:07, 26 March 2025
PBKDF2 (category Cryptography standards)
passphrase along with a salt value and repeats the process many times to produce a derived key, which can then be used as a cryptographic key in subsequent...
13 KB (1,337 words) - 03:48, 21 April 2025
Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
67 KB (2,932 words) - 23:20, 16 May 2025
Preimage attack (category Cryptographic attacks)
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash function...
7 KB (895 words) - 15:44, 13 April 2024
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic...
13 KB (1,524 words) - 21:51, 14 May 2025
from 2012 Salt (cryptography), random data that is used as an additional input to a one-way function that hashes a password or passphrase Salt (software)...
8 KB (1,032 words) - 01:14, 2 May 2025
cryptographically secure pseudorandom number generator or from a hardware random number generator. Salt (cryptography) Pseudorandomness Cryptographic...
3 KB (389 words) - 02:59, 23 March 2025
Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"...
99 KB (10,975 words) - 11:30, 14 May 2025
Crypt (C) (category Broken cryptography algorithms)
the newer directory services (ds) system. Key derivation function Salt (cryptography) crypt(3) – FreeBSD Library Functions Manual Simson Garfinkel, Alan...
28 KB (3,039 words) - 17:30, 30 March 2025
and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines...
20 KB (1,901 words) - 07:15, 23 January 2025
Convergent encryption (category Cryptography)
encryption), or to simply not use convergent encryption in the first place. Salt (cryptography) Deterministic encryption Secure Data Deduplication, Mark W. Storer...
5 KB (797 words) - 16:13, 26 January 2023
Initialization vector (category Cryptography)
In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state....
14 KB (1,797 words) - 08:53, 7 September 2024
Rainbow table (category Cryptographic attacks)
A rainbow table is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically...
24 KB (3,485 words) - 05:27, 9 May 2025
In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master...
13 KB (1,640 words) - 18:48, 30 April 2025
scheduler Introduced the new caching framework Security improvements with Salt (cryptography) & RSA Integration of Extbase & Fluid features Current version: 4...
36 KB (2,502 words) - 08:59, 15 May 2025
NaCl (software) (category Cryptographic software)
NaCl (Networking and Cryptography Library, pronounced "salt") is a public domain, high-speed software library for cryptography. NaCl was created by the...
10 KB (745 words) - 15:07, 3 March 2025
Merkle tree (category Cryptographic hash functions)
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
15 KB (1,790 words) - 06:31, 3 March 2025
salt. NaCl may also refer to: Saline (medicine), the salt solution used as a medication NaCl (software), a public domain networking and cryptography library...
368 bytes (73 words) - 22:17, 20 July 2022
In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific...
18 KB (2,316 words) - 18:51, 16 April 2025
Message authentication code (redirect from MAC (cryptography))
In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
16 KB (1,918 words) - 17:55, 22 January 2025
Password Hashing Competition (redirect from Makwa (cryptography))
competition Password Hashing Competition NSA Suite B CNSA Utilization Hash-based cryptography Merkle tree Message authentication Proof of work Salt Pepper...
3 KB (256 words) - 18:15, 31 March 2025
Avalanche effect (redirect from Avalanche (cryptography))
In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions...
5 KB (568 words) - 17:23, 14 December 2023
Challenge–response authentication (redirect from Challenge (Cryptography))
impractical to implement a true nonce, a strong cryptographically secure pseudorandom number generator and cryptographic hash function can generate challenges that...
11 KB (1,540 words) - 19:04, 12 December 2024