1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
14

It was stated that the inclusion of the salt in the UNIX password scheme increases the difficulty of guessing by a factor of 409

6. But the salt is stored in plaintext in the same entry as the corresponding ciphertext password. Therefore, those two characters are known to the attacker and need not be guessed. Why is it asserted that the salt increases security?
Computers and Technology
1 answer:
Furkat [3]3 years ago
4 0

Answer: Explanation:

Salting alters the hash of a password so that it does not physically match the hash of another password. A salt and password are concatenated and processed with a cryptographic hash function. Salt prevents use of rainbow and hash tables to attacking and cracking passwords.

For example, a user has the password, "password000" and is put through a SHA1 hash. In the password database, all of the users with the password "password000" will have the exact same hash, because of the nature of hashing functions.  So, if an attacker breaches the database and brute force the password of the user mentioned above, he could look for all the hashes that match the original user's and would know their passwords are also "password000".

By applying a salt, the password hashes would no longer be identical to one another, even though the actual password is still the same. This requires the attacker to go in and attempt to brute force the second password (which has a different salt), even though it may be the same as the first.

In conclusion, it prevents an attacker from uncovering one password and subsequently uncovering multiple others.

You might be interested in
Write an if statement that prints the message ""The number is not valid"" if the variable distance is outside the range 100 thr
Slav-nsk [51]

Answer:

The solution code is written in Python:

  1. if(distance < 100 or distance > 2000):
  2.        print("The number is not valid")

Explanation:

In this question either one of the two conditions (distance < 100 or distance > 2000) is met, the error message should be generated. Python offers the "or" keyword as a logical operator. The "or" keyword will join two conditions and so long as one of them is True, the final outcome will be evaluated to True. For example, if distance = 90 the error message will be printed. If distance is 2500, the error message will also be printed.

5 0
4 years ago
. Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
Lena [83]

Answer:

A favor:  porque permite manejar la memoria, disco, medios de almacenamiento de información y los diferentes periféricos o recursos de nuestra computadora, como son el teclado, el mouse, la impresora, la placa de red, entre otros.

En contra:

Si uno llega a fallar con un codigo en algun sistema puede verse afectado el dispositivo

Explanation:

8 0
3 years ago
Algorithm for converting decimal into binary.
belka [17]
The simplest way is to make for loop first you need to<span> generate 1,2,4,8,16,32,64,128,256....and others number in Array. Then you will check every number. Like this.</span>
<span>Decimal </span>Input 84;
64 is closest to 84.
84-64=20
<span>Write: </span>1
20-32=-12(Because It's negative you will write 0)
Write:10
20-16=4
<span>Write: </span>101
4-8=-4 (Negative)
Write:1010
4-4=0
<span>Write: </span>10101
0-2=-2
0-1=-1
<span>Write: </span><span>1010100 = 84</span>
7 0
4 years ago
What is the best stratiget to avoid paying intrest in your credit cared
pochemuha
Paying it in full month over month.
4 0
3 years ago
Provide the subnet, broadcast address and the valid host ranges for each of the
avanturin [10]

Answer:

You should now be able to give IP addresses to 254 hosts. This works fine if all 150 computers are on a single network. However, your 150 computers are on three separate physical networks. Instead of requesting more address blocks for each network, you divide your network into subnets that enable you to use one block of addresses on multiple physical networks

Explanation:

3 0
3 years ago
Other questions:
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • Why should we continue to study and learn about ipv4 addressing if the available ipv4 address space is depleted?
    12·2 answers
  • What are the functions of online gaming communities?
    12·1 answer
  • Suppose that for an experimental device setup we have to choose settings for three parameters. There are 4, 3 and 5 settings for
    11·1 answer
  • Which quality is likely to ensure consistent career growth in the computer field?
    9·2 answers
  • Drag the tiles to the correct boxes to complete the pairs.
    7·2 answers
  • Why are renewable natural resources important? A.fossil fuels can be replaced quickly.
    10·1 answer
  • What are your thoughts about this re-designed Logo? Is it good? Or is poorly designed? Explain your answer below.
    13·1 answer
  • How to save an edited document.​
    6·1 answer
  • What type of software repairs or improves a larger application that is already installed on a system?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!