Relacionar Columnas Security+ Key StretchingVersión en línea This will help with Comptia Security+ Key Stretching concepts por Brody Campbell 1 Key stretching uses _______ to add additional bits to the hash 2 The 2 common key stretching techniques are: __________ and __________ 3 Based on blowfish block cipher Used in linux to encrypt shadow file Salts the password before encrypting with blowfish 60 Character string Can also pepper the salt 4 Can help thwart ______ and _______ attacks. 5 Uses salts of at least 64-bit Uses pseudo-random functions like HMAC to protect passwords Used by WPA2 Can send it through the process over 1000 times Common bit sizes of 128 / 256 / 512 More susceptible to brute force PBKDF2 Rainbow table & brute force bcrypt bcrypt & PBKDF2 salting