In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?
A. Keyed Hashing
B. Key Stretching
C. Salting
D. Double Hashing
A. Keyed Hashing
B. Key Stretching
C. Salting
D. Double Hashing