Lecture 3 Flashcards

1
Q

SQL injection

A
  • Code injection technique that might destroy your database.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password Hashing

A

Hashing is the process of generating a string, or hash from a given message using a mathematical function known as cryptographic hash function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Four properties of password hashing:

A
  1. It should be deterministic: The same message processed by the same hash function should always have the same hash.
  2. It’s not reversible: It’s impractical to generate a message from its hash.
  3. It has high entropy: A small change to a message should produce a vastly different hash.
  4. It resists collisions: Two different messages should not produce the same hash.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rainbow table

A

A precomputed table for reversing cryptographic hash functions, usually for cracking password hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Salts

A

Short random set of characters that are appended to the end of a password before it is hashed. Not added by the client. Same for a bunch of passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Peppers

A

Short string or character appended to the end of a password. Peppers are different and random for each password. Not added by the client. Pepper is not stored.

Extra time to crack, extra time to log in has the password will have to be hashed all the way until the password is correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly