课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Key stretching

Key stretching

- [Narrator] Many encryption technologies depend upon the ability to create an encryption key from a password in a way that remains strong. Key stretching technologies allow this to happen. The basic idea behind key stretching is that an algorithm takes a relatively insecure value, such as a password, and manipulates it in a way that makes it stronger and more resilient to threats like dictionary attacks. Key stretching combines two different techniques to add strength to an encryption key. First, it combines encryption keys with a value known as a salt to modify the key. This process is known as salting. Second, it hashes the resulting value to add time to the key checking process. This might be less than a second, but key stretching algorithms repeat this process hundreds or thousands of times to consume more computing power. The idea is that if a user knows the correct password, the second or two that takes to verify the password is not a big deal. However, if an attacker is trying…

内容