A security administrator wishes to implement a method of generating encryption keys from user
passwords to enhance account security. Which of the following would accomplish this task?
A.
NTLMv2
B.
Blowfish
C.
Diffie-Hellman
D.
PBKDF2
A security administrator wishes to implement a method of generating encryption keys from user
passwords to enhance account security. Which of the following would accomplish this task?
A security administrator wishes to implement a method of generating encryption keys from user
passwords to enhance account security. Which of the following would accomplish this task?
A.
NTLMv2
B.
Blowfish
C.
Diffie-Hellman
D.
PBKDF2