N/APosted on - 11/15/2014
Hashed and salted passwords are used in cryptography to reduce password vulnerability to hash attacks. What is the process of hashing? What is the process of salting? How do hashing and salting work to protect passwords from brute attacks? In this context, what is fingerprinting?
How does a hashed and salted password protect your data?
You can use hashing to delete, search, or create from a table. The basic idea behind it is to get a field in a record, which is referred to as the key, and then converts it using several permanent process into a numeric value, which is referred to as the hash key.
The hash key denotes the position to either find or store an item in the table. The numeric value or the hash key will be in the range from 0 to n-1 where n is the maximum number of slots in the table. Hash function is the term used for the fixed process of converting a key to a hash key.
The hash function is used every time the table needs to be accessed. One common technique of verifying a hash key is through the use of division method. The formula for the division method of hashing is: hash key = key % number of slots in the table.