You are concerned about the strength of your cryptographic keys, so you implement a system that does the following: The initial key is fed into the input of the bcrypt utility on a Linux workstation. The bcrypt utility produces an enhanced key that is 128 bits long.
The resulting enhanced key is much more difficult to crack than the original key. Which kind of encryption mechanism was used in this scenario?
a. Ephemeral keys
b.Perfect forward secrecy
c. Key stretching
d. DHE Explanation