Technology

Forgot Password? Yes.

Jan 13, 2026
Gayatri Pandkar
107 views
3
Forgot Password? Yes.
Instead of storing your actual password, systems use hashing: an irreversible process that scrambles it into gibberish. Slowing down the hackers after your password, includes sprinkling some “salt” and “pepper” (like seasoning but make it cooler). The vibe? Making hacking so exhausting - they quit. So, stop reusing “qwerty123” and start coming up with the most obnoxious passwords out there.

When you’re told to include 8+ characters, a number, a capital letter and special characters into your password … you really should. You likely already know how careful you are with passwords, created several many as well but they aren’t just stored on a tiny little sticky note hidden deep in your drawer (that you think no one will find…). They’re stored in giant databases. The question is, how safe are these databases?

Imagine being able to hack into giant databases, there’s millions of user records. But instead of seeing “qwerty123” in the passwords column you see this → $34h$XeG3lQwl$a43MkxP9.

When you type in your password, the system doesn’t store it as it is. Instead, it runs your password through a hash function → which is simply a mathematical algorithm that converts any data into a unique fixed-length string of characters. Think of making a smoothie, you dump a bunch of fruits into a mixer, and your product is this one colour smoothie. Now if you’re able to come up with a way to get the fruit back from that smoothie … please contact us. That’s how the hash function works; it’ll turn your password into what you see as gibberish but is really a combination of random characters. It has 3 features - 1) it’s irreversible 2) the tiniest of changes will change the hash completely 3) same input = same output.

But hey, hackers are pretty smart because if you didn’t realize hashes weren't enough, they did. Hackers know people reuse weak passwords, so they make this huge list of common passwords and their hashes. These lists are called rainbow tables. That’s an instant KO for you and a win for them. The next concept isn’t about adding salt and pepper to your smoothie (I’m not stopping you from trying that out though), it’s about techniques that save security engineers from being fired … or keep your password safe.

Systems add something called “salt” to the hash and it’s simply just a random string of characters that’s added to your password before hashing takes place. This solves 2 problems - 2 users having the same password and rainbow tables.

Adaptive Hashing Algorithms (AHA) like bcrypt and argon2 are hashing algorithms that consume time and memory making it harder for the attacker to guess your password. Third, “pepper” is a secret value that’s stored externally, like in a hardware security module … Google and Amazon definitely use peppering (as mentioned in their security guidelines).


Just know password security isn’t about making it impossible for hackers to hack your password but more about making it so impractical and exhausting that they give up.

Gayatri Pandkar

About Gayatri Pandkar

Technology Lead

Hello! I'm Gayatri, a physics enthusiast who's fascinated by developments in technology, specifically in robotics, generative AI, blockchains & cybersecurity. Outside of academics, I'm an artist who's curious about game design & mechanics and loves to break down some of the most interesting concepts into simpler bits to get down to the fundamentals.

Comments

0

Leave a Comment