The threat abatement program manager tasked the software engineer with identifying the fastest
implementation of a hash function to protect passwords with the least number of collisions. Which
of the following should the software engineer implement to best meet the requirements?
A.
hash = sha512(password + salt);
for (k = 0; k < 4000; k++) {
hash = sha512 (hash);
}
B.
hash = md5(password + salt);
for (k = 0; k < 5000; k++) {
hash = md5 (hash);
}
C.
hash = sha512(password + salt);
for (k = 0; k < 3000; k++) {
hash = sha512 (hash + password + salt);
}
D.
hash1 = sha1(password + salt);
hash = sha1 (hash1);