SlideShare a Scribd company logo
1 of 1
Download to read offline
what is the threat and solution for when alice sends a password and bob hashing it and
comparing it against a database of hashed passwords?
Solution
In given scenario, dictionary attack may be the possible threat in which hacker tries to get the
decipher key by trying million of possibilities like in dictionary. There are various data types of
dictionary attack software in the market which ease the work of a hacker.
Possible solution for the given threat is using salt which is a random data which is used an
additional input for the hashing. A new salt is generated for each password. Generated salt and
password are concated and applied to hash function and obtained result is stored in the database
with salt value. Since, salt is different for each password, therefore it can be used for common
passwords as well. For example, salt is used in UNIX system credentials, Internet security etc.

More Related Content

Similar to what is the threat and solution for when alice sends a password and .pdf

Techniques for password hashing and cracking
Techniques for password hashing and crackingTechniques for password hashing and cracking
Techniques for password hashing and cracking
Nipun Joshi
 

Similar to what is the threat and solution for when alice sends a password and .pdf (10)

Storing passwords-honey words
Storing passwords-honey wordsStoring passwords-honey words
Storing passwords-honey words
 
Using Cryptography Properly in Applications
Using Cryptography Properly in ApplicationsUsing Cryptography Properly in Applications
Using Cryptography Properly in Applications
 
Techniques for password hashing and cracking
Techniques for password hashing and crackingTechniques for password hashing and cracking
Techniques for password hashing and cracking
 
IRJET- Encrypted Negative Password using RSA Algorithm
IRJET- Encrypted Negative Password using RSA AlgorithmIRJET- Encrypted Negative Password using RSA Algorithm
IRJET- Encrypted Negative Password using RSA Algorithm
 
Hashing
HashingHashing
Hashing
 
How to Use Cryptography Properly: The Common Mistakes People Make When Using ...
How to Use Cryptography Properly: The Common Mistakes People Make When Using ...How to Use Cryptography Properly: The Common Mistakes People Make When Using ...
How to Use Cryptography Properly: The Common Mistakes People Make When Using ...
 
Practical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersPractical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for Developers
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of Defense
 
Web cryptography javascript
Web cryptography javascriptWeb cryptography javascript
Web cryptography javascript
 

More from kisgstin23

Describe the E-C and the players involved in the electrical and mech.pdf
Describe the E-C and the players involved in the electrical and mech.pdfDescribe the E-C and the players involved in the electrical and mech.pdf
Describe the E-C and the players involved in the electrical and mech.pdf
kisgstin23
 
Harden, Harden, & Harden is a venerable Wall Street stock brokerage .pdf
Harden, Harden, & Harden is a venerable Wall Street stock brokerage .pdfHarden, Harden, & Harden is a venerable Wall Street stock brokerage .pdf
Harden, Harden, & Harden is a venerable Wall Street stock brokerage .pdf
kisgstin23
 
Every time we have to make a choice we are faced with an opportunity.pdf
Every time we have to make a choice we are faced with an opportunity.pdfEvery time we have to make a choice we are faced with an opportunity.pdf
Every time we have to make a choice we are faced with an opportunity.pdf
kisgstin23
 
Canadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdfCanadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdf
kisgstin23
 
A linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdfA linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdf
kisgstin23
 
3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf
kisgstin23
 
What professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdfWhat professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdf
kisgstin23
 

More from kisgstin23 (20)

John Smith wrote fraudulent checks and made false statements when ap.pdf
John Smith wrote fraudulent checks and made false statements when ap.pdfJohn Smith wrote fraudulent checks and made false statements when ap.pdf
John Smith wrote fraudulent checks and made false statements when ap.pdf
 
Describe the E-C and the players involved in the electrical and mech.pdf
Describe the E-C and the players involved in the electrical and mech.pdfDescribe the E-C and the players involved in the electrical and mech.pdf
Describe the E-C and the players involved in the electrical and mech.pdf
 
In a large population, 59 of the people have been vaccinated. If 4 .pdf
In a large population, 59  of the people have been vaccinated. If 4 .pdfIn a large population, 59  of the people have been vaccinated. If 4 .pdf
In a large population, 59 of the people have been vaccinated. If 4 .pdf
 
Harden, Harden, & Harden is a venerable Wall Street stock brokerage .pdf
Harden, Harden, & Harden is a venerable Wall Street stock brokerage .pdfHarden, Harden, & Harden is a venerable Wall Street stock brokerage .pdf
Harden, Harden, & Harden is a venerable Wall Street stock brokerage .pdf
 
Every time we have to make a choice we are faced with an opportunity.pdf
Every time we have to make a choice we are faced with an opportunity.pdfEvery time we have to make a choice we are faced with an opportunity.pdf
Every time we have to make a choice we are faced with an opportunity.pdf
 
Complete a Punnett square to show the genotypes and phenotypes expec.pdf
Complete a Punnett square to show the genotypes and phenotypes expec.pdfComplete a Punnett square to show the genotypes and phenotypes expec.pdf
Complete a Punnett square to show the genotypes and phenotypes expec.pdf
 
Did both the North and South initially go to war in 1861 over the is.pdf
Did both the North and South initially go to war in 1861 over the is.pdfDid both the North and South initially go to war in 1861 over the is.pdf
Did both the North and South initially go to war in 1861 over the is.pdf
 
Can really use some help with the following UNIXLINUX commands and .pdf
Can really use some help with the following UNIXLINUX commands and .pdfCan really use some help with the following UNIXLINUX commands and .pdf
Can really use some help with the following UNIXLINUX commands and .pdf
 
Canadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdfCanadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdf
 
Below are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdfBelow are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdf
 
A linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdfA linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdf
 
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
A. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdfA. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdf
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
 
3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf
 
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
 
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdfYou isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
 
What professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdfWhat professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdf
 
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdfWhat is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
 
What is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdfWhat is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdf
 
What is the difference between sequential file access and random fil.pdf
What is the difference between sequential file access and random fil.pdfWhat is the difference between sequential file access and random fil.pdf
What is the difference between sequential file access and random fil.pdf
 
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdfThis theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 

what is the threat and solution for when alice sends a password and .pdf

  • 1. what is the threat and solution for when alice sends a password and bob hashing it and comparing it against a database of hashed passwords? Solution In given scenario, dictionary attack may be the possible threat in which hacker tries to get the decipher key by trying million of possibilities like in dictionary. There are various data types of dictionary attack software in the market which ease the work of a hacker. Possible solution for the given threat is using salt which is a random data which is used an additional input for the hashing. A new salt is generated for each password. Generated salt and password are concated and applied to hash function and obtained result is stored in the database with salt value. Since, salt is different for each password, therefore it can be used for common passwords as well. For example, salt is used in UNIX system credentials, Internet security etc.