COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following are examples of key stretching algorithms?Choose all that apply.
A
ROT13
B
Twofish
C
Bcrypt
D
DSA
E
PBKDF2
Explanation: 

Detailed explanation-1: -PBKDF2 applies a pseudorandom function, such as hash-based message authentication code (HMAC), to the input password or passphrase along with a salt value and repeats the process many times to produce a derived key, which can then be used as a cryptographic key in subsequent operations.

Detailed explanation-2: -Key stretching works by taking a key generated from a user’s password and then repeatedly converting it to a longer and more random key that can be used to secure our confidential data.

There is 1 question to complete.