1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
14

It was stated that the inclusion of the salt in the UNIX password scheme increases the difficulty of guessing by a factor of 409

6. But the salt is stored in plaintext in the same entry as the corresponding ciphertext password. Therefore, those two characters are known to the attacker and need not be guessed. Why is it asserted that the salt increases security?
Computers and Technology
1 answer:
Furkat [3]3 years ago
4 0

Answer: Explanation:

Salting alters the hash of a password so that it does not physically match the hash of another password. A salt and password are concatenated and processed with a cryptographic hash function. Salt prevents use of rainbow and hash tables to attacking and cracking passwords.

For example, a user has the password, "password000" and is put through a SHA1 hash. In the password database, all of the users with the password "password000" will have the exact same hash, because of the nature of hashing functions.  So, if an attacker breaches the database and brute force the password of the user mentioned above, he could look for all the hashes that match the original user's and would know their passwords are also "password000".

By applying a salt, the password hashes would no longer be identical to one another, even though the actual password is still the same. This requires the attacker to go in and attempt to brute force the second password (which has a different salt), even though it may be the same as the first.

In conclusion, it prevents an attacker from uncovering one password and subsequently uncovering multiple others.

You might be interested in
Which of the following is the most significant result of technological innovation?
olga_2 [115]
I think it’s System updates bc you have to use some type of technology to be able to update whatever your doing
6 0
3 years ago
Read 2 more answers
How do you think Beyoncé choreography has/will influence the future of dance?
kaheart [24]

Answer: So choreographers do have the same rights as songwriters over the dissemination of their  skill, prestige, acclaim, power, visibility, popularity, influence, and potential  Will she find beauty in her 2019 forays in to Broadway

Explanation:

7 0
3 years ago
Read 2 more answers
What are node in a computer network​
BabaBlast [244]

Answer:

A node is a connection point inside a network that can receive, send, create, or store data. Each node requires you to provide some form of identification to receive access, like an IP address. A few examples of nodes include computers, printers, modems, bridges, and switches.

3 0
2 years ago
5. Why do we need programming language?​
Natasha_Volkova [10]

Answer:

hajshshzjsjwb

Explanation:

bsbjsjsjwjwjs

3 0
3 years ago
Read 2 more answers
100 POINTS NEED THIS BEFORE 11:59 TODAY!!!!!!!!!!!!!!!
AVprozaik [17]

Answer:ok be how hobrhkihfehgdhdj fuiufiisefif jfkijfjfhhfhfhfhf

Explanation:

5 0
3 years ago
Other questions:
  • Drag the tiles to the correct boxes to complete the pairs.
    7·2 answers
  • 1.) How do parks and other green spaces benefit a community?
    7·2 answers
  • Write a Java application that inputs a series of 10 integers and determines and prints the largest and smallest integer. Use a c
    12·1 answer
  • Who is the owner of microsoft company​
    12·1 answer
  • Liz's meeting is scheduled to end at 9:30. It is 9:20 and team
    9·1 answer
  • Write a statement that toggles the value of the bool variable onoffswitch. that is, if onoffswitch is false , its value is chang
    10·1 answer
  • Help me I'm so confused by this question
    7·1 answer
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • Create a file name that to ensure the that the file is easy to find
    12·2 answers
  • Write a pseudocode for the logic of a program that accepts five numbers from a user and displays one of the following messages:-
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!