Evaluation:
Published: 10.09.2021.
Language: English
Level: Secondary school
Literature: 3 units
References: Not used
  • Presentations 'Cryptography', 1.
  • Presentations 'Cryptography', 2.
  • Presentations 'Cryptography', 3.
  • Presentations 'Cryptography', 4.
  • Presentations 'Cryptography', 5.
  • Presentations 'Cryptography', 6.
  • Presentations 'Cryptography', 7.
  • Presentations 'Cryptography', 8.
  • Presentations 'Cryptography', 9.
  • Presentations 'Cryptography', 10.
  • Presentations 'Cryptography', 11.
  • Presentations 'Cryptography', 12.
  • Presentations 'Cryptography', 13.
  • Presentations 'Cryptography', 14.
Extract

hashing
Important to use complex and unique passwords
Hashing algorithms always produce the same hash for the same password
Steps to «hacking»:
Compute the hash for «password»

Check if it matches with the hash that corresponds to you
If it does, your password is «password»
Rainbow tables and protection against them
Databases of hashes to common passwords
Answer to rainbow tables: «salt»
Pin = «0000», pin with salt = «0000B_of_A_salt»
Salt makes the passwords have an entirely different hash
Allows you to have much more combinations


Author's comment
Send to email

Your name:

Enter an email address where the link will be sent:

Hi!
{Your name} suggests you to check out this eKönyvtár paper on „Cryptography”.

Link to paper:
https://eng.ekonyvtar.eu/w/171004

Send

Email has been sent