312-50V12 · Question #309
312-50V12 Question #309: Real Exam Question with Answer & Explanation
The correct answer is A: Key stretching. Kevin employed key stretching, a technique that strengthens encryption keys by iteratively processing an initial key through an algorithm to generate a more robust, enhanced key resistant to brute-force attacks.
Question
Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?
Options
- AKey stretching
- BPublic key infrastructure
- CKey derivation function
- DKey reinstallation
Explanation
Kevin employed key stretching, a technique that strengthens encryption keys by iteratively processing an initial key through an algorithm to generate a more robust, enhanced key resistant to brute-force attacks.
Common mistakes.
- B. Public key infrastructure (PKI) is a system for managing digital certificates and public/private key pairs to establish trust and authenticate identities, not a method for strengthening a single encryption key against brute-force attacks.
- C. A key derivation function (KDF) is an algorithm that derives one or more secret keys from a secret value, but key stretching is a specific application of a KDF designed to deliberately increase the computational cost of derivation to resist brute-force attacks.
- D. Key reinstallation refers to a vulnerability where an attacker can exploit the reinstallation of cryptographic keys, particularly in Wi-Fi protocols like WPA2, to compromise network security, rather than a technique to enhance key strength.
Concept tested. Key stretching for brute-force resistance
Topics
Community Discussion
No community discussion yet for this question.