COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
ROT13
|
|
Twofish
|
|
Bcrypt
|
|
DSA
|
|
PBKDF2
|
Detailed explanation-1: -Bcrypt, scrypt, and PBKDF2 are all examples of key stretching algorithms.
Detailed explanation-2: -PBKDF2 prevents password cracking tools from making the best use of graphics processing units (GPUs), which reduces guess rates from hundreds of thousands of guesses per second, to less than a few tens of thousands of guesses per second.
Detailed explanation-3: -BCRYPT: BCRYPT is a password-hashing algorithm based on the Blowfish cipher. PBKDF2: PBKDF2 stores passwords with a random salt and with the password hash using HMAC; it then iterates, which forces the regeneration of every password and prevents any rainbow table attack.
Detailed explanation-4: -Password-Based Key Derivation Function 2 (PBKDF2) bcrypt. 31-Jul-2022