A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

What is a Rainbow Table?

 , updated on
A rainbow table is a precomputed table for reversing hash functions, usually for passwords that are stored hashed.

Threat

It is common for databases of passwords to be leaked in an attack. As passwords are commonly stored as hash values, these passwords can't typically be used to gain access to a system. Rainbow tables are one method of attempting to convert such data into usable passwords. Rainbow tables are typically computed for commonly used hashing algorithms and contain the hashes of commonly used passwords. As the rainbow table is precomputed, matching is a fast processes that can occur before anyone realizes the password data has leaked.

Defense

Cryptographic salt renders rainbow tables useless as it pads each password with random data resulting in longer hash data that can't be predicted from common passwords.
Overview: Rainbow Table
Type
Definition
Precomputed tables of hashed data.
Related Concepts
Next: Hashcode
More about encryption:
Cleartext
Cryptography
Hashcode
Key Stretching
Keys
Nonce
Pepper
Private Key
Random Seed
Salt
Plaintext
Pseudorandom
Public Key
Public Key Encryption
Strong Password
Symmetric Encryption
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Cryptography

A list of cryptography concepts.

Hashcode

An overview of hashcodes.

Pseudorandom vs Random

The difference between a pseudorandom and true random number.

Cryptographic Keys

Definitions of common types of cryptographic key.

Password vs Key

The difference between passwords and keys.

Digital Watermark

A definition of digital watermark with examples.

Network Security

An extensive list of network security techniques.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map