exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 330 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 330
Topic #: 1
[All 312-50v11 Questions]

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks.
What is the technique employed by Kevin to improve the security of encryption keys?

  • A. Key stretching
  • B. Public key infrastructure
  • C. Key derivation function
  • D. Key reinstallation
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Scryptic
Highly Voted 2 years, 7 months ago
In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) it takes to test each possible key. Passwords or passphrases created by humans are often short or predictable enough to allow password cracking, and key stretching is intended to make such attacks more difficult by complicating a basic step of trying a single password candidate. Key stretching also improves security in some real-world applications where the key length has been constrained, by mimicking a longer key length from the perspective of a brute-force attacker.[1] https://en.wikipedia.org/wiki/Key_stretching#:~:text=In%20cryptography%2C%20key%20stretching%20techniques,to%20test%20each%20possible%20key.
upvoted 8 times
...
12787
Most Recent 6 months, 3 weeks ago
The technique employed by Kevin to improve the security of encryption keys, based on the information provided, is typically referred to as "Key Derivation." Key derivation is a cryptographic process used to derive a stronger and more secure key from an initial key or a passphrase. The goal is to create keys that are resistant to brute-force attacks and other cryptographic vulnerabilities. Answer is C
upvoted 2 times
...
steffBarj
9 months, 2 weeks ago
C. Key Derivation function
upvoted 3 times
...
victorfs
12 months ago
Selected Answer: A
The correct option is A. A. Key stretching
upvoted 1 times
...
Ayeeshar
1 year ago
Key stretching is a technique used to enhance the security of cryptographic keys. It involves applying a one-way function, such as a hash function or a key derivation function, to a key multiple times in order to increase the time and resources required for an attacker to brute-force or guess the original key. The idea behind key stretching is to make the key stronger by increasing its length and making it more random-looking. This makes it more difficult for an attacker to guess the original key, even if they have access to the encrypted data and the algorithm used to encrypt it.
upvoted 1 times
...
Bobbypizza
1 year, 5 months ago
Selected Answer: A
Described in other comments
upvoted 1 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: A
Key Stretching Key stretching refers to processes used to make a weak key stronger, usually by making it longer. This technique helps in defending against brute-force attacks.In the key stretching technique, the initial key is given as input to an algorithm that generates an enhanced key. The key must be sufficiently resistant to brute-force attacks. (P.3137/3121)
upvoted 2 times
...
uday1985
1 year, 6 months ago
A. Key stretching key stretching (uncountable) (cryptography) Techniques used to make a key more secure against brute force attacks by increasing the resources needed to test each possible key.
upvoted 1 times
...
atsagar
1 year, 7 months ago
Selected Answer: A
Key Stretching in correct answer. check CEH v11 Module 20 Page 3121
upvoted 1 times
...
djaBSNYVXSHGX
2 years ago
Selected Answer: A
Key strecthing
upvoted 1 times
...
mrhaky
2 years, 3 months ago
C he encrypted the checksum no the message to verify the content
upvoted 1 times
...
jinjection
2 years, 7 months ago
Correct A
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago