When we are using any computer
which requires password authentication, the need to hide the passwords arises.
The passwords related to systems are stored in the database either hashed or in
plain text or using various other methods. These tables are vulnerable to theft
as plaintext passwords are a dangerous attempt. Mostly, the passwords are
stored as cryptographic hashes of user’s passwords. By using hashes for the
passwords no one can determine the actual password. The authentication requires
matching of two values, the entered one and the value stored in databases. The
access is granted only when the two values match.