Question: In a system,each user has an entry in the system's password file: ( y , s ) where y iscomputed as follows and s is

In a system,each user has an entry in the system's password file:(y,s)where y iscomputed as follows and s is a salt.
i.y=H(password,s) where H is SHA-1
ii.y=H(s,password)password
iii.y=H(s)H(password)
iv.y=E(s,password)where E is AES and the first input of E is the key
v.y=E(password,s)
vi.y=E(s,H(password))
vii.y=MAC(s,password)where MAC is HMAC and the first input of MAC is the key
viii. y=MAC(password,s)
List which of the methods above for computing y are secure against(precomputed)dictionary attack.Assume that s is 40 bits long and randomly chosen.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!