A-Z Popular New Security Search »
Information Security
 
Related Guides

What is a Nonce?

 , updated on
A nonce is a random number or string that is used once and only once for cryptography and information security. They are typically generated with a random number generator or algorithms that generate reproducible results based on factors such as a timestamp and a key. The following are illustrative examples.

Authentication

Authentication protocols may use a nonce to prevent replay attacks. A nouce that can only be used once prevents an old message being resent to authenticate.

Cryptographic Salt

Cryptographic salt is a type of nouce that is added to a string before it is hashed to make the hash more difficult to reverse.

One-time Passwords

A nouce may be generated and then communicated to a user as a one time password. For example, a customer that calls customer support to reset their password may be given a nouce that enables them to perform the reset.
Overview: Nonce
Type
Definition
A random number or phrase that is only used once.
Related Concepts

Encryption

This is the complete list of articles we have written about encryption.
Cleartext
Cryptography
Hashcode
Key Stretching
Keys
Nonce
Pepper
Private Key
Random Seed
Salt
Plaintext
Pseudorandom
Public Key
Public Key Encryption
Strong Password
Symmetric Encryption
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Cryptography

A list of cryptography concepts.

Hashcode

An overview of hashcodes.

Pseudorandom vs Random

The difference between a pseudorandom and true random number.

Cryptographic Keys

Definitions of common types of cryptographic key.

Password vs Key

The difference between passwords and keys.

Digital Watermark

A definition of digital watermark with examples.

Network Security

An extensive list of network security techniques.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map