Select from following answers:- Hash the data.
- Use asymmetric encryption.
- Use obfuscation.
- All Above
Cryptographic hashes map data from any length to a fixed-length byte sequence. Hashes are statistically unique; a different two-byte sequence will not hash to the same value. A malicious user cannot recreate the original data from the stored hash value. The application, however, will be able to authenticate by hashing the provided password and comparing with the saved hash value.
Secret-key encryption (symmetric cryptography) performs a transformation on data to keep third parties from reading it. However, if a malicious user compromises your site and your encryption key, passwords could be decrypted.
Show Correct Answer
Source: Measureup.com | |
Alert Moderator