A security technician wants to improve the strength of a weak key by making it more secure against brute force attacks. Which of the following would achieve this?
A. Blowfish
B. Key stretching
C. Key escrow
D. Recovery agent
2 Comments on “Which of the following would achieve this?”
Davesays:
Should be B.
0
0
Mikesays:
I think it is B:
From Kingfisher book:
A key stretching technique will take a weak key,
process it, and output an enhanced and more powerful key. Often, this process will
increase the size of the key to 128 bits, making attacks such as brute-force attacks
much more difficult, if not impossible. Examples of key stretching software include
PBKDF2 and bcrypt.
Should be B.
0
0
I think it is B:
From Kingfisher book:
A key stretching technique will take a weak key,
process it, and output an enhanced and more powerful key. Often, this process will
increase the size of the key to 128 bits, making attacks such as brute-force attacks
much more difficult, if not impossible. Examples of key stretching software include
PBKDF2 and bcrypt.
0
0