New Activity
Play Matching Pairs

The 2 common key stretching techniques are: __________ and __________

Based on blowfish block cipher Used in linux to encrypt shadow file Salts the password before encrypting with blowfish 60 Character string Can also pepper the salt

Uses salts of at least 64-bit Uses pseudo-random functions like HMAC to protect passwords Used by WPA2 Can send it through the process over 1000 times Common bit sizes of 128 / 256 / 512 More susceptible to brute force

Key stretching uses _______ to add additional bits to the hash

Can help thwart ______ and _______ attacks.

salting

bcrypt & PBKDF2

bcrypt

Rainbow table & brute force

PBKDF2