1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Salting
The most common approach to preventing rainbow table attacks is ___, which adds a randomly generated value to each password prior to hashing
Key stretching
is used to create encryption keys from passwords in a strong manner
Blockchain
A distributed and immutable open public ledger. This means that it can store records in a way that distributes those records among many different systems located around the world and do so in a manner that prevents anyone from tampering with those records. The ___ creates a data store that nobody can tamper with or destory
Homomorphic Encryption
When you encrypt data with a ___ algorithm and then perform computation on that data, you get a result that, when decrypted, matches the result you would have received if you had performed the computation on the plain-text data in the first place