![]() |
![]()
| ![]() |
![]()
NAME
SYNOPSIS
int
DESCRIPTION
A typical application of this function is to derive keying material for an encryption algorithm from a password in the data parameter. Increasing the count parameter slows down the algorithm, which makes it harder for an attacker to perform a brute force attack using a large number of candidate passwords. If the total key and IV length is less than the digest length and MD5 is used, then the derivation algorithm is compatible with PKCS#5 v1.5. Otherwise, a non-standard extension is used to derive the extra data. Newer applications should use more standard algorithms such as PBKDF2 as defined in PKCS#5v2.1 for key derivation. KEY DERIVATION ALGORITHMThe key and IV is derived by concatenating D_1, D_2, etc. until enough data is available for the key and IV. D_i is defined recursively as: D_i = HASH^count(D_(i-1) || data ||
salt) where || denotes concatenation, D_0 is empty, HASH is the digest algorithm in use, HASH^1(data) is simply HASH(data), HASH^2(data) is HASH(HASH(data)) and so on. The initial bytes are used for the key and the subsequent bytes for the IV. RETURN VALUESIf data is SEE ALSOHISTORY
|