COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Examples of key stretching algorithms include:(Select 2 answers)
A
ROT13
B
Twofish
C
Bcrypt
D
DSA
E
PBKDF2
Explanation: 

Detailed explanation-1: -Bcrypt, scrypt, and PBKDF2 are all examples of key stretching algorithms.

Detailed explanation-2: -PBKDF2 prevents password cracking tools from making the best use of graphics processing units (GPUs), which reduces guess rates from hundreds of thousands of guesses per second, to less than a few tens of thousands of guesses per second.

Detailed explanation-3: -BCRYPT: BCRYPT is a password-hashing algorithm based on the Blowfish cipher. PBKDF2: PBKDF2 stores passwords with a random salt and with the password hash using HMAC; it then iterates, which forces the regeneration of every password and prevents any rainbow table attack.

Detailed explanation-4: -Password-Based Key Derivation Function 2 (PBKDF2) bcrypt. 31-Jul-2022

There is 1 question to complete.