From the course: CompTIA SecurityX (CAS-005) Cert Prep

Unlock this course with a free trial

Join today to access over 24,300 courses taught by industry experts.

Key stretching and splitting

Key stretching and splitting

- In this lesson, we're going to explore key stretching and key splitting. So first off, we have key stretching, which is a cryptographic technique to make weak keys, which we have here, into computationally more strong keys, where they're difficult to crack. So, we can apply a cryptographic hash to this weak key and go through many iterations and stretch the key to make it much more longer, much more non-deterministic and resistant to brute force attacks. Now, there's kind of two main protocols that we can use to do this. One of them is BPKDF2, and that is Password-Based, PB, Key Derivation, KD, Function 2. So this algorithm applies a pseudorandom function to the input password, along with a SALT, okay, a few extra pseudorandom characters. And then they repeat this process many, many times to derive a much stronger key. Another option we can use or it's built in to, let's say, our key management software or built into something like WPA3 is bcrypt, and bcrypt is based on the Blowfish…

Contents