COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following are examples of key stretching algorithms?Choose all that apply.
|
ROT13
|
|
Twofish
|
|
Bcrypt
|
|
DSA
|
|
PBKDF2
|
Explanation:
Detailed explanation-1: -PBKDF2 applies a pseudorandom function, such as hash-based message authentication code (HMAC), to the input password or passphrase along with a salt value and repeats the process many times to produce a derived key, which can then be used as a cryptographic key in subsequent operations.
Detailed explanation-2: -Key stretching works by taking a key generated from a user’s password and then repeatedly converting it to a longer and more random key that can be used to secure our confidential data.
There is 1 question to complete.