COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks?
A
Seed
B
IV
C
Salt
D
Shim
Explanation: 

Detailed explanation-1: -In cryptography, the term “Key stretching” refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks.

Detailed explanation-2: -In cryptography, a salt is random data that is used as an additional input to a one-way function that hashes data, a password or passphrase. Salts are used to safeguard passwords in storage.

Detailed explanation-3: -In symmetric encryption the same key is used for encryption and decryption. It is therefore critical that a secure method is considered to transfer the key between sender and recipient.

Detailed explanation-4: -Pseudo-random data added to a password before hashing is called: Shim.

Detailed explanation-5: -Asymmetric Key Algorithms The Diffie-Hellman algorithm is mostly used for key exchange. Although symmetric key algorithms are fast and secure, key exchange is always a problem. You have to figure out a way to get the private key to all systems. The Diffie-Hellman algorithm helps with this.

There is 1 question to complete.