Key Stretching Algorithms 6.2 Flashcards

1
Q

Key Strengething

A

A weak key is a weak key. In order to strengthen it, you can hash a password, hash the hash, and then hash the hash of the hash again. The more you stretch it, the stronger it becomes. Brute force attacks will require reversing each of the hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Stretching Libraries

A

There are a number of libraries avail for developers.

bcrypt - Generates hashes from passwords. An extension to the UNIX crypt library using the Blowfish cipher to perform multiple rounds of hashing.

Password-Based Key Derivation Function 2 (PBKDF2) - Part of RSA public key cryptography standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly