Pepper (cryptography): Revision history


For any version listed below, click on its date to view it. For more help, see Help:Page history and Help:Edit summary. (cur) = difference from current version, (prev) = difference from preceding version, m = minor edit, → = section edit, ← = automatic edit summary

(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)

10 October 2023

19 August 2023

16 February 2023

29 November 2022

30 October 2022

31 March 2022

30 March 2022

4 November 2021

15 September 2021

7 September 2021

17 June 2021

21 February 2021

12 February 2021

17 December 2020

10 December 2020

23 November 2020

18 November 2020

12 November 2020

11 November 2020

4 November 2020

3 November 2020

31 October 2020

30 October 2020

22 September 2020

21 September 2020

31 August 2020

31 May 2020

23 March 2020

29 February 2020

12 February 2020

20 January 2020

31 December 2019

5 July 2019

  • curprev 13:0813:08, 5 July 201993.132.34.228 talk 3,923 bytes +258 Undid revision 885106389 by 173.64.109.100. Unfortunately, the new text was incorrect: even with a very strong hashing algorithm, weak passwords can be cracked. As for the original text, it's not magic. See the Adobe case: they encrypted their passwords and not a single password has been cracked through technical means (we can use the password hints to guess some of them, but the encryption and its key remain unbroken). A strong encryption key is needed of course. I clarified that in the article undo Tag: Undo

26 February 2019

17 January 2019

18 November 2018

13 October 2018

  • curprev 12:5612:56, 13 October 2018LucGommans talk contribs 5,071 bytes +2,389 The citation cited another paper from 1996, where a pepper is indeed a tossed value, but this definition is very outdated. In 1996, password hashing was barely a thing. Password storage is a fast-moving field when compared to cryptography in general and practices change every five to ten years. Password storage functions ("slow hashes") are now common and achieve the same goal more efficiently than tossed secrets. These days, in the context of hashing, pepper is unambiguously a secret input. undo

7 June 2018

(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)