Crear actividad
Jugar Relacionar Columnas

Based on blowfish block cipher Used in linux to encrypt shadow file Salts the password before encrypting with blowfish 60 Character string Can also pepper the salt

The 2 common key stretching techniques are: __________ and __________

Key stretching uses _______ to add additional bits to the hash

Uses salts of at least 64-bit Uses pseudo-random functions like HMAC to protect passwords Used by WPA2 Can send it through the process over 1000 times Common bit sizes of 128 / 256 / 512 More susceptible to brute force

Can help thwart ______ and _______ attacks.

PBKDF2

Rainbow table & brute force

salting

bcrypt

bcrypt & PBKDF2