in reply to How to use salt with CGI::Application::Plugin::Authentication
Here’s my understanding of the purpose of “salting.” The secret consists of three things:
If the token that you have in your hands was formed only from the first two things, then there would be a one-to-one correspondence (details unknown to you, perhaps, but nonetheless one-to-one) between that token and the secret which it conceals. If you could accumulate a few hundred million messages (not an unreasonable proposition), you might be able to divine the secret. But if the secrets are “salted” using a number that also has a few hundred million possibilities, you might never wind up with the exact same token value twice, even though every one of them conceals the same secret. You have just tossed a huge amount of entropy into what would otherwise be a deterministic (although convoluted...) calculation.
But you do have to use the idea of salt in the right way. If the salt value is stored, all you’ve really done is to make the effective-password 32 bits longer. You haven’t actually “salted” anything.
| Replies are listed 'Best First'. | |
|---|---|
|
Re^2: How to use salt with CGI::Application::Plugin::Authentication
by Argel (Prior) on May 11, 2011 at 19:17 UTC | |
by Anonymous Monk on May 11, 2011 at 23:49 UTC | |
|
Re^2: How to use salt with CGI::Application::Plugin::Authentication
by Anonymous Monk on May 11, 2011 at 23:33 UTC |