Pepper (cryptography): Difference between revisions
AFD closed as keep (XFDcloser) |
m Add salt as linked page |
||
Line 41: | Line 41: | ||
==See also== |
==See also== |
||
* [[passwd]] |
* [[passwd]] |
||
* [[Salt (cryptography)]] |
|||
==References== |
==References== |
Revision as of 14:27, 10 April 2018
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
In cryptography, a pepper is a secret added to an input such as a password prior to being hashed with a cryptographic hash function. A pepper performs a similar role to a salt, but while a salt is stored alongside the hashed output, a pepper is not. A pepper usually meets one of two criteria:
- The pepper is at least as long as the salt and is stored separately from the value to be hashed, often as an application secret.
- The pepper is small and randomly generated for each input to be hashed, and is never stored. To verify whether an input matches, the application iterates through the full set of possible values for the pepper (to avoid timing attacks), testing each resulting hash in turn[1][dubious – discuss]
A pepper adds security to a database of hashes because it increases the number of secret values that must be recovered (whether by brute force or discovery) to recover the inputs.
Example usage
Here is an incomplete example of using a constant pepper when storing passwords. This first table has two username and password combinations.
Username | Password |
user1 | password123 |
user2 | password123 |
The password is not stored, and the 8-byte (64-bit) pepper 44534C70C6883DE2 is stored in a secure location separate to the hashed values.
Username | String to be Hashed | Hashed Value = SHA256(Password + Pepper) |
user1 | password123+44534C70C6883DE2 | D63E21DF3A2A6853C2DC675EDDD4259F3B78490A4988B49FF3DB7B2891B3B48D |
user2 | password123+44534C70C6883DE2 | D63E21DF3A2A6853C2DC675EDDD4259F3B78490A4988B49FF3DB7B2891B3B48D |
In contrast to a salt, a pepper does not on its own protect against identifying users who have the same password, but it does protect against dictionary attacks unless the attacker has the pepper value. As a pepper will not be shared between applications, an attacker will be unable to directly match hashes from one leaked database to another.
A complete password storage scheme would typically include a salt and pepper.
See also
References
- ^ "Catena: A Memory-Consuming Password-Scrambling Framework". citeseerx.ist.psu.edu. Retrieved 2016-12-09.