Cyber Security Expo
 
Key Iterations & Cryptographic Salts by Adam Berent on 05/09/03

Discusses the use of key iterations and cryptographic salts to stop dictionary attacks in password based encryption (symmetric cryptography).

This document is in pdf format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.