Question: ) Using salted Hash is to make attackers work more expensive . There are other ways to achieve the same goal. For example, instead of
Using salted Hash is to make attackers work more expensive There are other ways to achieve the same goal. For example, instead of storing Hashpassword the system stores Hashpassword For a user who entered hisher password, the system will Hash the password times and see if the final result matches the stored one. Meanwhile, an attacker who wants to build a rainbow table will also spend times than if Hashpassword is stored.
While doing this indeed slows down the attackers offline password guessing attempt, it also significantly increases the servers effort. Suppose the server still stores Hashpassword but when Alice logs in her client machine first computes Hashpassword and sends that to the server.
a Will there still be the advantage gained by storing Hashpassword
b Will this save the server computation?
To answer both questions, first clearly give a YesNo and then use a few sentences to explain why you make this conclusion. Using salted Hash is to make attackers work more expensive There are other ways to achieve the same goal. For example, instead of storing Hashpassword the system stores Hashpassword For a user who entered hisher password, the system will Hash the password times and see if the final result matches the stored one. Meanwhile, an attacker who wants to build a rainbow table will also spend times than if Hashpassword is stored.
While doing this indeed slows down the attackers offline password guessing attempt, it also significantly increases the servers effort. Suppose the server still stores Hashpassword but when Alice logs in her client machine first computes Hashpassword and sends that to the server.
a Will there still be the advantage gained by storing Hashpassword
b Will this save the server computation?
To answer both questions, first clearly give a YesNo and then use a few sentences to explain why you make this conclusion.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
