1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
10

Considering the concept of salted passwords, answer the following questions: a. Bob thinks that generating and storing a random

salt value for each user id is a waste. Instead, he is proposing that his system administrators use a cryptographic hash of the user id as its salt. Describe whether this choice impacts the security of salted passwords and include an analysis of the respective search spaces.
Computers and Technology
1 answer:
nignag [31]3 years ago
3 0

Answer:

Salt helps the attacker to create a separate dictionary for every salt value. Salt is random data that used additional input functions that hash data, such as passwords. Passwords in plain text stored on the system. However, some additional guards developed to protect the user's password against the system.

Explanation:

Salt is randomly generated for each password. The password is processed with the hash function and output that is stored with salt in the database. Hashing is authentication without exposure to plain text passwords.

Salt does not have to be used by humans and defend pre-computed hash attacks. Hash table required to attach. Salt is different who protect the passwords. Users with the same passwords on several websites protect by salt. Salt hashes making hash instances for the same password.

Hashing is a one-way function and used for authentication. Salting is an association with hashed passwords.

Security of salted passwords:

Salt does not protect a lone attacker after one password. An attacker will calculate hash if the password is hash that is maybe a combination of salt + password.

Salt helps if the attacker is attacking a site and wants to break many passwords. Without salt, attackers can quickly attack accounts. With a correctly chosen salt attacker has to start over for each hashed password.

All password attempts are attempting to crack all accounts because hashed can be pre-computed.

You might be interested in
What are the advantages of renting a home over buying a home? What are some disadvantages?
weqwewe [10]
An advantage of renting a home is that you don't have to fix any appliances or structures of the home your landlord does that for you. disadvantages are you have to follow their rules, you can't change anything on the inside like the paint or add a room to the home. in the state of Washington and landlord can evict you with only 20 days notice if they want to permanently sell the property. that's called a no-fault eviction. that's all I can think of hope that helps
7 0
3 years ago
Students who finish their homework after school are meeting a. intrapersonal and short-term goals b. normative and short-term go
3241004551 [841]

Answer: a. intrapersonal and short-term goals

Explanation:

Intrapersonal goals are those that we set for ourselves in our minds to accomplish. The students that are finishing their homework after school most probably set that goal in their minds and so meeting it would mean meeting their intrapersonal goals.

Homework is not a long term project but rather a short one that is usually meant to be completed within days. Completing it is therefore a short term goal.

The students who finish their homework after school are therefore accomplishing both their intrapersonal and short-term goals.

6 0
3 years ago
Read 2 more answers
Who could vote in the first democracy?
zmey [24]
B citizens

in the 4th century there were about 100k citizens. only about 40k could participate in the democratic process ( this is only if the question is referring to ancient democracy )
4 0
3 years ago
Design a TestScores class that has fields to hold three test scores. The class should have a constructor, accessor and mutator m
sweet-ann [11.9K]

Answer:

Answered below

Explanation:

class TestScores {

double test1;

double test2;

double test 3;

public TestScores (double test1, double test2, double teat3){

this.test1= test1;

this.test2 = test2;

this.test3 = teat3;}

//mutator

public setTest1(double test1){

this.test1 = test1;

}

//accessor

public double getTest1(){

return test 1;

}

//Write same accessors and mutators for test2 and test3

public double getTestAverage(){

double sum = test1+test2+test3;

return sum / 3;

}

}

class TestRun{

public static void main (String [] args){

TestScores scores = new TestScores(50.5, 40.0, 80.7)

int average = scores.getTestAverage();

System.out.print(average);

}

6 0
3 years ago
Scanner can be used to read tokens from a String literal Scanner can be used to read tokens from the console window (user input)
Paladinen [302]

Answer:

Scanner can be used to read tokens from the console window (user input)

Explanation:

Scanner is a class used in some programming languages to obtain inputs from users.

It is mostly well developed in Java programming language and used exclusively for taking and obtaining inputs.

Scanner takes input in primitive types such as doubles, floats and integers. IT also takes string inputs.

Here is a code snippet where the class scanner is used:

         Scanner input = new Scanner (System.in)

The code above creates an object of the scanner class

7 0
4 years ago
Other questions:
  • What was the first fully computer animated feature film?
    13·1 answer
  • The Technology Librarian asks you to find out how many hops it takes to get to the first Wi-Fi kiosk. What Windows command can y
    5·1 answer
  • Unlike memory, this type of storage holds data and programs even after electrical power to the computer system has been turned o
    10·1 answer
  • What is the difference between - and % in mysql
    15·1 answer
  • What tells the hardware what to do and how to do it?
    9·1 answer
  • Which of the following symbols is a part of all spreadsheet functions?
    7·2 answers
  • burger hut is trying to decide if it can receive money from the government for providing employees with insurance .
    6·1 answer
  • What is the second row of letters in the keyboard called?
    6·1 answer
  • In “Plugged In,” the author’s purpose is to persuade. Which of the following quotes from the text shows that the author’s purpos
    15·1 answer
  • What do you think that private information like passwords pin number will be guarded or shared with the public? why?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!