1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
14

It was stated that the inclusion of the salt in the UNIX password scheme increases the difficulty of guessing by a factor of 409

6. But the salt is stored in plaintext in the same entry as the corresponding ciphertext password. Therefore, those two characters are known to the attacker and need not be guessed. Why is it asserted that the salt increases security?
Computers and Technology
1 answer:
Furkat [3]3 years ago
4 0

Answer: Explanation:

Salting alters the hash of a password so that it does not physically match the hash of another password. A salt and password are concatenated and processed with a cryptographic hash function. Salt prevents use of rainbow and hash tables to attacking and cracking passwords.

For example, a user has the password, "password000" and is put through a SHA1 hash. In the password database, all of the users with the password "password000" will have the exact same hash, because of the nature of hashing functions.  So, if an attacker breaches the database and brute force the password of the user mentioned above, he could look for all the hashes that match the original user's and would know their passwords are also "password000".

By applying a salt, the password hashes would no longer be identical to one another, even though the actual password is still the same. This requires the attacker to go in and attempt to brute force the second password (which has a different salt), even though it may be the same as the first.

In conclusion, it prevents an attacker from uncovering one password and subsequently uncovering multiple others.

You might be interested in
Question 7 Consider the following code:
zhannawk [14.2K]

Answer:

Melon

Explanation:

The variable "list" containts a function that returns a price that is greater than or equal to 60.0.

In the variable "fruit", the only item in the array with a price attribute set above that number is the string Melon.

3 0
2 years ago
During the weekend, Alice often needs to access files stored on her office desktop from her home laptop. Last week, she installe
ICE Princess25 [194]

Answer:

Depending on the error message which Alice get but what could have gone wrong is perhaps firewall issue.

Explanation:

There are lots of probable reason why Alice could not access her files during the weekend but below are some common reasons:

Firewall issue: Maybe Alice has her firewall turned on unknowingly as it is known that firewall do block such types of connection except it is explicitly allowed from the firewall settings.  Another issue might be that, Alice ISP uses firewall.

FTP programs Setting: Perhaps there is a settings which Alice has not activated in the FTP program that she is using.

3 0
4 years ago
(I WILL GIVE BRAINLIEST) Which steps will delete an appointment?
Nastasia [14]

Answer:

right clicking should be your answer

3 0
3 years ago
Alexa it is olewi.............................................
Sladkaya [172]

Answer:

jvksvksdvkbvkjsdkcn

Explanation:

6 0
3 years ago
Read 2 more answers
What is income?
s2008m [1.1K]
I think its D hope this help
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which view In a presentation program displays you’re slides in full screen modes ?
    8·2 answers
  • When you first start your computer, which software will have to start first?
    5·2 answers
  • The set of communications rules for exchanging information electronically on the internet is called the ________.
    10·1 answer
  • How can a user view the options for Junk E-mail?
    11·2 answers
  • You are the network administrator for a school system. Your boss informs you that she is thinking of implementing a BYOD program
    15·2 answers
  • When a formula contains the address of a cell, it is called a(n) ________.
    15·1 answer
  • python An instance variable named counter of type int An instance variable named limit of type int. A constructor that takes two
    15·1 answer
  • Write an expression to compute the quartic root of x. the quartic root of a number is the square root of its square root. exampl
    11·1 answer
  • Which of the following is not a key component of a structure?
    12·1 answer
  • Explain the basic operations of a computer system​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!