Content deleted Content added
m remove Erik9bot category,outdated, tag and general fixes |
|||
Line 9:
==Single party methods==
Some systems attempt to derive a cryptographic key directly from a password. However, such practice is generally ill-advised when there is a threat of [[brute-force attack]]. Techniques to mitigate such attack include [[passphrase]]s and iterated (deliberately-slow) password-based key derivation functions such as PBKDF2 (RFC 2898).
and my name is nora
==Multi-party methods==
|