A security engineer wants to ensure that even if two users have the same password, their stored password hashes are different. Which of the following techniques should be implemented?
Use a different hashing algorithm for each user.
Store passwords in plain text for verification.
Add unique data to each password before hashing.
Implement asymmetric encryption for password storage.