2000
DOI: 10.17487/rfc2898
|View full text |Cite
|
Sign up to set email alerts
|

PKCS #5: Password-Based Cryptography Specification Version 2.0

Abstract: This memo represents a republication of PKCS #5 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification.This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions, encryption schemes, message-authentication schemes, and ASN.1 syntax identifying the tec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
189
0
7

Year Published

2006
2006
2020
2020

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 269 publications
(198 citation statements)
references
References 10 publications
(12 reference statements)
2
189
0
7
Order By: Relevance
“…The private key K priv user , corresponding to K pub user is secured using AES in counter with CBC-MAC (CCM) mode (see [16]) with a decryption key derived (see [11]) from the decryption PIN, known only to the user.…”
Section: Signature Creationmentioning
confidence: 99%
“…The private key K priv user , corresponding to K pub user is secured using AES in counter with CBC-MAC (CCM) mode (see [16]) with a decryption key derived (see [11]) from the decryption PIN, known only to the user.…”
Section: Signature Creationmentioning
confidence: 99%
“…While many servers adopt the current state-of-the-art approach for storing passwords in a hashed form, e.g. using PBKDF2 [14,23] or bcrypt [20], with a random salt to protect against server compromise or re-use attacks, there have been many known cases, e.g. [21,17,22,10], where passwords have been stored in clear and compromised subsequently.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, more than ninety percent of the 6.5 million password hashes pilfered from LinkedIn were cracked within six days [32]. Dedicated password hashes such as bcrypt [43] or PBKDF2 [37] only give a linear security improvement: n times more effort to verify passwords for an honest server makes offline dictionary attacks at most n times harder. his password attempt.…”
Section: Introductionmentioning
confidence: 99%