Salt-Hash:

Salt is randomly generated text that is added to password before the hash is obtained.

The original purpose of salting was to avoid pre-computing rainbow table attacks that could otherwise, be used to increase the efficiency of cracking the compromised password database significantly. A greater advantage now is to slow down parallel transactions which compare password hash with many password hashing.

Salting is the act of applying several random characters to password before the hash function is used. How’s it going to work? Let’s take look: 

Password

Hash

  1.  MD5 password123
EC666499C5469DC80D5CAAD158A5E0BD
2. SHA-1 password123 430E0143FC76486408A9A9C5B104A5D87DB272D4
3. SHA-256 password123 4D7D7CDD6FE1E24C78D4CA831E8CE13EB0345992FD2F699C4FE08D61912DF323
4. SHA-384 password123CE5265F5CFB4B22AA279F66570BB5662C94416CE903A7F09DABDD704C87716D1E91962F5979318F352C628DD2CCD53A8
5. SHA-512 password12347A706DBA3402639FAB0AE3F0BC9128CBEB847CD5D2264637C81962D50F983AC826D8FB372BD89B893877A3A179638E7ABA3897E1D22FE834F8F9B39EBA8EDF5

Here, wherever you enter the password (password123) you will get the new salt hash will be generated in the database. It won’t be repeated the same salt hash.

LEAVE A REPLY

Please enter your comment!
Please enter your name here