Salting is the inclusion of a random value in the password hashing process that greatly decreases the likelihood of identical passwords returning the same hash. Larger salts effectively make the use of Rainbow Tables (lookup tables) by attackers infeasible. Many operating systems implement salted password hashing mechanisms to reduce the effectiveness of password cracking.
Stretching, which is another technique to mitigate the use of rainbow tables, involves hashing each password and its salt thousands of times. Larger stretching makes the creation of rainbow tables more time-consuming, which is not good for the attacker, but good for the attacked organization. Rainbow tables are lookup tables that contain precomputed password hashes. Therefore, passwords with high entropy, larger salts, and larger stretching can mitigate password guessing and cracking attempts by attackers.
18. In electronic authentication using tokens, the authenticator in the general case is a function of which of the following?
a. Token secret and salt or challenge
b. Token secret and seed or challenge
c. Token secret and nonce or challenge
d. Token secret and shim or challenge
A salt is a nonsecret value used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker.
A seed is a starting value to generate initialization vectors. A nonce is an identifier, a value, or a number used only once. Using a nonce as a challenge is a different requirement than a random-challenging because a nonce is predictable.
A shim is a layer of host-based intrusion detection and prevention code placed between existing layers of code on a host that intercepts data and analyzes it.
19. In electronic authentication, using one token to gain access to a second token is called a:
a. Single-token, multifactor scheme
b. Single-token, single-factor scheme
c. Multitoken, multifactor scheme
d. Multistage authentication scheme
20. As a part of centralized password management solutions, which of the following statements are true about password synchronization?
1. No centralized directory
2. No authentication server
3. Easier to implement than single sign-on technology
4. Less expensive than single sign-on technology
a. 1 and 3
b. 2 and 4
c. 3 and 4
d. 1, 2, 3, and 4
21. As a part of centralized password management solutions, password synchronization becomes a single point-of-failure due to which of the following?
a. It uses the same password for many resources.
b. It can enable an attacker to compromise a low-security resource to gain access to a high-security resource.
c. It uses the lowest common denominator approach to password strength.