Salt and pepper defend against the hacking attacks.Salt and pepper is generally used in the context of food items but they are interestingly also used in computer sciences. Salt and pepper are random data which are added to a data set before generating a hash code. This helps in making the cryptographic hash functions more secure and it is more difficult to reverse them.
Salt and pepper, both are used to add to data set before generating hash code and the only difference is that salt data is stored alongside the hash value while pepper data is either stored separately from the hash code or not stored at all. Unlike salt, the pepper data is kept secret.
Hashcode is used to verify data integrity and is a basic element used in encryption. Generally passwords are stored as hash codes. To prevent the stored passwords from being exploited by hackers, they are generally stored as a hash code. Still, hackers break it using precomputed tables of hash codes commonly known as rainbow tables. The importance of salt and pepper technique comes handy here as they defend against such hacking attacks.
So, salt and pepper is a peculiar but useful nomenclature in the world of encryption.
This is my entry for TOW contest.