A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

Cryptography: Salt vs Pepper

 , updated on
Salt is random data that is added to data before generating a hash code. It is common to store the salt alongside the hash value.
Pepper is also random data that is added to data before generating a hash code. Unlike salt, pepper is kept secret. In many cases, pepper isn't stored at all. In other cases, it is securely stored separately from the hash code.

Salt & Pepper

Salt and pepper make cryptographic hash functions more difficult to reverse. Both salt and pepper may be added to data before hashing it.
Passwords are commonly stored as a hash code. This prevents the stored passwords from being used. One common way to break a hash code is to use precomputed tables of hash codes for common passwords known as rainbow tables. Salt and pepper defend against this type of attack.
Salt vs Pepper
Salt
Pepper
Definition
Random data that is added to data before passing it to a cryptographic hash function. Salt may be stored alongside the hash value.
Random data that is added to data before passing it to a cryptographic hash function. Pepper is kept secret by storing it in a separate secure location or not storing it at all.
Next: Key Stretching
More about cryptography:
Cleartext
Cryptography
Hashcode
Key Stretching
Keys
Nonce
Pepper
Private Key
Random Seed
Salt
Plaintext
Pseudorandom
Public Key
Public Key Encryption
Strong Password
Symmetric Encryption
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Cryptography

A list of cryptography concepts.

Hashcode

An overview of hashcodes.

Pseudorandom vs Random

The difference between a pseudorandom and true random number.

Cryptographic Keys

Definitions of common types of cryptographic key.

Password vs Key

The difference between passwords and keys.

Digital Watermark

A definition of digital watermark with examples.

Network Security

An extensive list of network security techniques.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map