Certified Ethical Hacker v11 312-50v11 – Question330

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks.
What is the technique employed by Kevin to improve the security of encryption keys?

A.
Key stretching
B. Public key infrastructure
C. Key derivation function
D. Key reinstallation

Correct Answer: A