• In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,533 words) - 12:18, 19 January 2025
  • In cryptography, a pepper is a secret added to an input such as a password during hashing with a cryptographic hash function. This value differs from...
    9 KB (1,161 words) - 14:26, 23 December 2024
  • reasons Salt (cryptography), a method to secure passwords Salted bomb, a nuclear weapon specifically engineered to enhance residual radioactivity Salting (confidence...
    2 KB (253 words) - 19:22, 31 December 2024
  • Thumbnail for Cryptographic nonce
    In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number...
    7 KB (881 words) - 16:27, 15 April 2025
  • pepper noise, a form of noise typically seen on images Salt (cryptography) and pepper (cryptography), additional input to a hashing function that acts as...
    2 KB (250 words) - 00:50, 15 March 2025
  • In cryptography, padding is any of a number of distinct practices which all include adding data to the beginning, middle, or end of a message prior to...
    23 KB (3,307 words) - 14:54, 5 February 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,299 words) - 20:13, 4 May 2025
  • Password algorithm Cryptographic hash function Hash collision Hash-based cryptography Cryptographic nonce Salt (cryptography) Cryptographic strength Block...
    18 KB (1,725 words) - 19:07, 26 March 2025
  • PBKDF2 (category Cryptography standards)
    passphrase along with a salt value and repeats the process many times to produce a derived key, which can then be used as a cryptographic key in subsequent...
    13 KB (1,337 words) - 03:48, 21 April 2025
  • Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Preimage attack (category Cryptographic attacks)
    In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash function...
    7 KB (895 words) - 15:44, 13 April 2024
  • A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic...
    13 KB (1,524 words) - 21:51, 14 May 2025
  • from 2012 Salt (cryptography), random data that is used as an additional input to a one-way function that hashes a password or passphrase Salt (software)...
    8 KB (1,032 words) - 01:14, 2 May 2025
  • cryptographically secure pseudorandom number generator or from a hardware random number generator. Salt (cryptography) Pseudorandomness Cryptographic...
    3 KB (389 words) - 02:59, 23 March 2025
  • Thumbnail for Cryptography
    Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"...
    99 KB (10,975 words) - 11:30, 14 May 2025
  • Crypt (C) (category Broken cryptography algorithms)
    the newer directory services (ds) system. Key derivation function Salt (cryptography) crypt(3) – FreeBSD Library Functions Manual Simson Garfinkel, Alan...
    28 KB (3,039 words) - 17:30, 30 March 2025
  • and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines...
    20 KB (1,901 words) - 07:15, 23 January 2025
  • Convergent encryption (category Cryptography)
    encryption), or to simply not use convergent encryption in the first place. Salt (cryptography) Deterministic encryption Secure Data Deduplication, Mark W. Storer...
    5 KB (797 words) - 16:13, 26 January 2023
  • Initialization vector (category Cryptography)
    In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state....
    14 KB (1,797 words) - 08:53, 7 September 2024
  • Rainbow table (category Cryptographic attacks)
    A rainbow table is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically...
    24 KB (3,485 words) - 05:27, 9 May 2025
  • Thumbnail for Key derivation function
    In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master...
    13 KB (1,640 words) - 18:48, 30 April 2025
  • Thumbnail for TYPO3
    scheduler Introduced the new caching framework Security improvements with Salt (cryptography) & RSA Integration of Extbase & Fluid features Current version: 4...
    36 KB (2,502 words) - 08:59, 15 May 2025
  • NaCl (software) (category Cryptographic software)
    NaCl (Networking and Cryptography Library, pronounced "salt") is a public domain, high-speed software library for cryptography. NaCl was created by the...
    10 KB (745 words) - 15:07, 3 March 2025
  • Thumbnail for Merkle tree
    Merkle tree (category Cryptographic hash functions)
    In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
    15 KB (1,790 words) - 06:31, 3 March 2025
  • salt. NaCl may also refer to: Saline (medicine), the salt solution used as a medication NaCl (software), a public domain networking and cryptography library...
    368 bytes (73 words) - 22:17, 20 July 2022
  • Thumbnail for HMAC
    In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific...
    18 KB (2,316 words) - 18:51, 16 April 2025
  • In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
    16 KB (1,918 words) - 17:55, 22 January 2025
  • competition Password Hashing Competition NSA Suite B CNSA Utilization Hash-based cryptography Merkle tree Message authentication Proof of work Salt Pepper...
    3 KB (256 words) - 18:15, 31 March 2025
  • Thumbnail for Avalanche effect
    In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions...
    5 KB (568 words) - 17:23, 14 December 2023
  • impractical to implement a true nonce, a strong cryptographically secure pseudorandom number generator and cryptographic hash function can generate challenges that...
    11 KB (1,540 words) - 19:04, 12 December 2024