Use of a One-Way Hash without a Salt
Applying of good salt and hash doesn't help attackers targeting individual password and possessing a great deal of computing resources available (e.g. cloud-based services or specialized, inexpensive hardware).
Despite cryptographical strength of the hash, many cryptographic functions aren't protected from attacks and can be vulnerable to massive computing resources.
In case of gaining access to to the hashes it will be easier to perform brute force attack with no salt but using
dictionary attack techniques such as rainbow tables.
Despite cryptographical strength of the hash, many cryptographic functions aren't protected from attacks and can be vulnerable to massive computing resources.
In case of gaining access to to the hashes it will be easier to perform brute force attack with no salt but using
dictionary attack techniques such as rainbow tables.