COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Shim
|
|
Salt
|
|
IV
|
|
Seed
|
Detailed explanation-1: -A cryptographic salt is made up of random bits added to each password instance before its hashing. Salts create unique passwords even in the instance of two users choosing the same passwords.
Detailed explanation-2: -Password salting adds random characters before or after a password prior to hashing to obfuscate the actual password. Because of the randomness of the salt, hackers have a very difficult time figuring out actual passwords from hashed salted passwords because their pre-calculated tables of passwords won’t work.
Detailed explanation-3: -Password hash salting is when random data – a salt – is used as an additional input to a hash function that hashes a password. The goal of salting is to defend against dictionary attacks or attacks against hashed passwords using a rainbow table.
Detailed explanation-4: -Salts and peppers are both values that can be added to password strings before they’re hatched to create unique hash values. Peppers work similarly to salts, except that peppers utilize a secret value that is reusable. Since peppers are reusable, you should avoid storing them alongside password hashes in your database.