Based on blowfish block cipher Used in linux to encrypt shadow file Salts the password before encrypting with blowfish 60 Character string Can also pepper the salt
The 2 common key stretching techniques are: __________ and __________
Key stretching uses _______ to add additional bits to the hash
Uses salts of at least 64-bit Uses pseudo-random functions like HMAC to protect passwords Used by WPA2 Can send it through the process over 1000 times Common bit sizes of 128 / 256 / 512 More susceptible to brute force
Can help thwart ______ and _______ attacks.
PBKDF2
Rainbow table & brute force
salting
bcrypt
bcrypt & PBKDF2