The 2 common key stretching techniques are: __________ and __________
Based on blowfish block cipher Used in linux to encrypt shadow file Salts the password before encrypting with blowfish 60 Character string Can also pepper the salt
Uses salts of at least 64-bit Uses pseudo-random functions like HMAC to protect passwords Used by WPA2 Can send it through the process over 1000 times Common bit sizes of 128 / 256 / 512 More susceptible to brute force
Key stretching uses _______ to add additional bits to the hash
Can help thwart ______ and _______ attacks.
salting
bcrypt & PBKDF2
bcrypt
Rainbow table & brute force
PBKDF2