!!!Overview [{$pagename}] is a non-secret, random value that's used to ensure that the same [message] (often a [Password]) will not consistently [hash] to the same output value.[1] [{$pagename}] is typically used to prevent precomputation attacks such as [Rainbow Tables] or dictionary attacks. [{$pagename}] is generally appended to the clear-text password, which is the encoded using the desired message digest algorithm, and then the clear-text [{$pagename}] is appended to the message digest and the resulting value is [Base64]. This makes it possible to determine what the salt was so that it can be used to determine whether a user-supplied password is correct. The [Crypt] uses a relatively weak 12-bit [{$pagename}], which means that there are only 4096 ways of encoding any value. This is a relatively low number, and therefore it is possible to construct dictionaries of every possible encoding for a wide range of values for use in breaking user passwords. Other [Password Storage Scheme] in OpenDS use a 64-bit [{$pagename}] which provide 18446744073709551616 different ways of encoding any one value. !! If you [{$pagename}] [Salted Password Hashing - Doing it Right|https://crackstation.net/hashing-security.htm|target='_blank'] [2] !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [What is the difference between hash salting and noncing?|https://stackoverflow.com/a/8176717/88122|target='_blank'] - based on information obtained 2016-10-28 * [#2] - [Salted Password Hashing - Doing it Right|https://crackstation.net/hashing-security.htm|target='_blank'] - based on information obtained 2016-10-28