Optional
algorithmThe name of the hash algorithm to be used.
Common values include SHA-256
, SHA-384
, and SHA-512
.
The hashed value that was generated during the protection process. This value is typically derived from the combination of a password and a salt.
The salt value that was used during the protection process. The salt is combined with the password to produce the hash, adding an additional layer of security.
Optional
spinThe number of iterations (also known as spin count) used during the hash computation process. A higher number increases the security by making brute-force attacks more difficult but also increases computation time.
Represents a locally stored encrypted password.
See