Salting is the inclusion of a random value in the password hashing process that greatly decreases the likelihood of identical passwords returning the same hash. Larger salts effectively make the use of Rainbow Tables (lookup tables) by attackers infeasible. Many operating systems implement salted password hashing mechanisms to reduce the effectiveness of password cracking.
Stretching, which is another technique to mitigate the use of rainbow tables, involves hashing each password and its salt thousands of times. Larger stretching makes the creation of rainbow tables more time-consuming, which is not good for the attacker, but good for the attacked organization. Rainbow tables are lookup tables that contain precomputed password hashes. Therefore, passwords with high entropy, larger salts, and larger stretching can mitigate password guessing and cracking attempts by attackers.
18. In electronic authentication using tokens, the authenticator in the general case is a function of which of the following?
a.
Token secret and salt or challengeb.
Token secret and seed or challengec.
Token secret and nonce or challenged.
Token secret and shim or challengeA salt is a nonsecret value used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker.
A seed is a starting value to generate initialization vectors. A nonce is an identifier, a value, or a number used only once. Using a nonce as a challenge is a different requirement than a random-challenging because a nonce is predictable.
A shim is a layer of host-based intrusion detection and prevention code placed between existing layers of code on a host that intercepts data and analyzes it.
19. In electronic authentication, using one token to gain access to a second token is called a:
a.
Single-token, multifactor schemeb.
Single-token, single-factor schemec.
Multitoken, multifactor schemed.
Multistage authentication scheme20. As a part of centralized password management solutions, which of the following statements are true about password synchronization?
1.
No centralized directory2.
No authentication server3.
Easier to implement than single sign-on technology4.
Less expensive than single sign-on technologya.
1 and 3b.
2 and 4c.
3 and 4d.
1, 2, 3, and 421. As a part of centralized password management solutions, password synchronization becomes a single point-of-failure due to which of the following?
a.
It uses the same password for many resources.b.
It can enable an attacker to compromise a low-security resource to gain access to a high-security resource.c.
It uses the lowest common denominator approach to password strength.