Clark Morris wrote:
>Would you mind explaining further what unsalted passwords are?

It's not unsalted passwords, it's unsalted hashes. The "salt" means "added 
entropy" (randomness). For example, when the password for 
[email protected]<mailto:[email protected]> is hashed, you might 
add "[email protected]" to the hashing process. That means that if 
Clark's password is IBM and my password is IBM, the hashes aren't the same.

The way that these unsalted hashes are cracked is by hashing common words and 
comparing. So if "IBM" hashes to "CF34D038" (yes, it would be longer, but) and 
they find "CF34D038" in the list of stolen hashes, they know they've found a 
password of "IBM". If the stolen data includes the userid/hash pairs, they now 
know that the userid with that hash has a password of "IBM".

If the passwords were salted, then even knowing that "[email protected]" 
was the salt for that account doesn't help (much), because now you have to hash 
every password you're trying against "[email protected]".

This is why unsalted=bad, as is using the same salt for all the passwords.

Does this make sense?
--
...phsiii

Phil Smith III
[email protected]<mailto:[email protected]>
Voltage Security, Inc.
www.voltage.com<http://www.voltage.com/>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to