This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" a password or passphrase. Salts are closely related to the concept of nonce. The primary function of salts is to defend against dictionary attacks or against its hashed equivalent, a pre-computed rainbow table attack.
Salts are used to safeguard passwords in storage. Historically a password was stored in plaintext on a system, but over time additional safeguards developed to protect a user's password against being read from the system. A salt is one of those methods.
A new salt is randomly generated for each password. In a typical setting, the salt and the password (or its version after Key stretching) are concatenated and processed with a cryptographic hash function, and the resulting output (but not the original password) is stored with the salt in a database. Hashing allows for later authentication without keeping and therefore risking the plaintext password in the event that the authentication data store is compromised.
Since salts do not have to be memorized by humans they can make the size of the rainbow table required for a successful attack prohibitively large without placing a burden on the users. Since salts are different in each case, they also protect commonly used passwords, or those who use the same password on several sites, by making all salted hash instances for the same password different from each other.
Earlier versions of Unix used a password file (
/etc/passwd) to store the hashes of salted passwords (passwords prefixed with two-character random salts). In these older versions of Unix, the salt was also stored in the passwd file (as cleartext) together with the hash of the salted password. The password file was publicly readable for all users of the system. This was necessary so that user-privileged software tools could find user names and other information. The security of passwords is therefore protected only by the one-way functions (enciphering or hashing) used for the purpose. Early Unix implementations limited passwords to 8 characters and used a 12-bit salt, which allowed for 4,096 possible salt values. This was an appropriate balance for 1970s computational and storage costs.
The shadow password system is used to limit access to hashes and salt. The salt is 8 characters, the hash is 86 characters, and the password length is unlimited.
Here is a simplified example usage of a salt value for storing passwords. This first table has two username and password combinations. The password is not stored.
The salt value is generated at random and can be any length, in this case the salt value is 8 bytes (64-bit) long. The hashed value is the hash of the salt value appended to the plaintext password. Both the salt value and hashed value are stored.
|Username||Salt Value||String to be Hashed||Hashed Value = SHA256(Password + Salt Value)|
As you can see from the hashed value, even though the plaintext passwords are the same, the hashed values are different. This is why the salt value prevents dictionary attacks, with the added benefit that users with the same password won't both be compromised if one password is cracked. While this does protect from an attacker using a leaked database of password hashes to attack other accounts with the same password, it does not protect a user from having their simple (commonly used or easily guessable) password guessed.
Public salt or salt reuse
A public salt is when a programmer uses the same salt for every hashed password.
While this will make current Rainbow tables useless, if the salt is hard coded into a popular product that salt can be extracted and a new Rainbow table can be generated using that salt.
Using a single salt also means that every user who inputs the same password will have the same hash. This makes it easier to attack multiple users by cracking only one hash.
When an attacker executes a dictionary attack to break a single password, the public hash offers no security as the attacker knows the password and the salt, the only two inputs to the hash function.
If a salt is too short, it will be easy for an attacker to create a rainbow table consisting of every possible salt appended to every likely password. Using a long salt ensures that a rainbow table for your database would be prohibitively large.
Web application implementations
It is common for a web application to store in a database the hash value of a user's password. Without a salt, a successful SQL injection attack may yield easily crackable passwords. Because many users re-use passwords for multiple sites, the use of a salt is an important component of overall web application security. Some additional references for using a salt to secure password hashes in specific languages (PHP, .NET, etc.) can be found in the external links section below.
To understand the difference between cracking a single password and a set of them, consider a single password file that contains hundreds of usernames and hashed passwords. Without a salt, an attacker could compute hash(attempt), and then check whether that hash appears anywhere in the file. The likelihood of a match, i.e. cracking one of the passwords with that attempt, increases with the number of passwords in the file. If salts are present, then the attacker would have to compute hash(salt[a], attempt), compare against entry A, then hash(salt[b], attempt), compare against entry B, and so on. This defeats "reusing" hashes in attempts to crack multiple passwords.
Salts also combat the use of hash tables and rainbow tables for cracking passwords. A hash table is a large list of pre-computed hashes for commonly used passwords. For a password file without salts, an attacker can go through each entry and look up the hashed password in the hash table or rainbow table. If the look-up is considerably faster than the hash function (which it often is), this will considerably speed up cracking the file. However, if the password file is salted, then the hash table or rainbow table would have to contain "salt . password" pre-hashed. If the salt is long enough and sufficiently random, this is very unlikely. Unsalted passwords chosen by humans tend to be vulnerable to dictionary attacks since they have to be both short and meaningful enough to be memorized. Even a small dictionary (or its hashed equivalent, a hash table) has a significant chance of cracking the most commonly used passwords. Since salts do not have to be memorized by humans they can make the size of the rainbow table required for a successful attack prohibitively large without placing a burden on the users.
(*Comment*: A hash table is a pre-compiled list of commonly used passwords and their hash value equivalents. A Rainbow table is generated using reduction functions. Reduction functions can operate in many ways, but a simplified method is to take a random value and generate a hash. The newly generated hash value is taken and a set number of characters are cut off. What remains forms the next password which is rehashed. This is reiterated a set number of times to form a chain of password-hash values. Only the first password and last hash value are kept. A number of reduced chains form a rainbow table. Salts do help to resist rainbow table and hash table methods. Reference: http://kestas.kuliukas.com/RainbowTables/)
More technically, salts protect against hash tables and rainbow tables as they, in effect, extend the length and potentially the complexity of the password. If the rainbow tables do not have passwords matching the length (e.g. an 8-byte password, and 2-byte salt, is effectively a 10-byte password) and complexity (non-alphanumeric salt increases the complexity of strictly alphanumeric passwords) of the salted password, then the password will not be found. If found, one will have to remove the salt from the password before it can be used.
The modern shadow password system, in which password hashes and other security data are stored in a non-public file, somewhat mitigates these concerns. However, they remain relevant in multi-server installations which use centralized password management systems to push passwords or password hashes to multiple systems. In such installations, the root account on each individual system may be treated as less trusted than the administrators of the centralized password system, so it remains worthwhile to ensure that the security of the password hashing algorithm, including the generation of unique salt values, is adequate.
Salts also make dictionary attacks and brute-force attacks for cracking large numbers of passwords much slower (but not in the case of cracking just one password). Without salts, an attacker who is cracking many passwords at the same time only needs to hash each password guess once, and compare it to all the hashes. However, with salts, each password will likely have a different salt; so each guess would have to be hashed separately and compared for each salt, which is considerably slower than comparing the same single hash to every password.
Another (lesser) benefit of a salt is as follows: two users might choose the same string as their password, or the same user might choose to use the same password on two machines. Without a salt, this password would be stored as the same hash string in the password file. This would disclose the fact that the two accounts have the same password, allowing anyone who knows one of the account's passwords to access the other account. By salting the passwords with two random characters, even if two accounts use the same password, no one can discover this just by reading hashes.
Recent Cyber attacks using SALT cryptography
After gaining access to servers downloading users information from those servers and showing the data online has become common
- Adobe customer data breach  where the user took the information and kept the data online using salt cryptography
- Password cracking
- Cryptographic nonce
- Initialization vector
- "Spice" in the Hasty Pudding cipher
- Rainbow tables
- Pepper (cryptography)
- "Passwords Matter". Retrieved 2016-12-09.
- "How Unix Implements Passwords [Book]".
- "Secure Salted Password Hashing - How to do it Properly".
- "ISC Diary – Hashing Passwords". Dshield.org. Retrieved 2011-10-15.
- "Adobe customer data breached – login and credit card data probably stolen, all passwords reset". Naked Security. 2013-10-04. Retrieved 2017-05-18.