Espionage
Search algorithms
Hashing
Rainbow table
Password
John the Ripper
LM hash
Salt
Crypt
Cryptography
Cryptographic hash functions
Computer security