Question: In a system,each user has an entry in the system's password file: ( y , s ) where y iscomputed as follows and s is
In a system,each user has an entry in the system's password file:yswhere y iscomputed as follows and s is a salt.
iyHpasswords where H is SHA
iiyHspasswordpassword
iii.yHsHpassword
ivyEspasswordwhere E is AES and the first input of E is the key
vyEpasswords
viyEsHpassword
vii.yMACspasswordwhere MAC is HMAC and the first input of MAC is the key
viii. yMACpasswords
List which of the methods above for computing y are secure againstprecomputeddictionary attack.Assume that s is bits long and randomly chosen.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
