The output of the key derivation function is stored as the encrypted version of the password.
Since the salt is usually different for each user, the attacker can no longer construct tables with a single encrypted version of each candidate password.
Then why leave an encrypted version of the message at all?
That's where these file-by-file systems have the advantage that basically you're storing encrypted versions of your file.
The encrypted versions of the messages then are:
So now you've got three encrypted versions of the key.
But he also has the two other encrypted versions of the key which were bundled into the zip file.
A laser printer hummed, and the coder produced the encrypted version under the original message.
There are people pushing for encrypted versions of those existing protocols to be used.
The encrypted version can be sent over just about any sort of communication line.