Function that derives secret keys from a secret value
This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations.(July 2013) (Learn how and when to remove this message)
In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher).[1][2][3] KDFs can be used to stretch keys into longer keys or to obtain keys of a required format, such as converting a group element that is the result of a Diffie–Hellman key exchange into a symmetric key for use with AES. Keyed cryptographic hash functions are popular examples of pseudorandom functions used for key derivation.[4]
^Bezzi, Michele; et al. (2011). "Data privacy". In Camenisch, Jan; et al. (eds.). Privacy and Identity Management for Life. Springer. pp. 185–186. ISBN 9783642203176.
^Chen, Lily (October 2009). "NIST SP 800-108: Recommendation for Key Derivation Using Pseudorandom Functions". NIST.
^Zdziarski, Jonathan (2012). Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It. O'Reilly Media. pp. 252–253. ISBN 9781449318741.
and 21 Related for: Key derivation function information
cryptography, a keyderivationfunction (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password...
cryptography, PBKDF1 and PBKDF2 (Password-Based KeyDerivationFunction 1 and 2) are keyderivationfunctions with a sliding computational cost, used to reduce...
the keyderivation system to go unaltered and should choose an appropriate number of hashes for the lifespan of the system). CPU-bound hash functions are...
common defense against this attack is to compute the hashes using a keyderivationfunction that adds a "salt" to each password before hashing it, with different...
password-based keyderivationfunctions - where the output is then used for the purpose of password hashing rather than just keyderivation. Password hashing...
cryptography, scrypt (pronounced "ess crypt") is a password-based keyderivationfunction created by Colin Percival in March 2009, originally for the Tarsnap...
Argon2 is a keyderivationfunction that was selected as the winner of the 2015 Password Hashing Competition. It was designed by Alex Biryukov, Daniel...
based on the Diffie–Hellman key exchange (DH) and a ratchet based on a keyderivationfunction (KDF), such as a hash function, and is therefore called a...
HKDF is a simple keyderivationfunction (KDF) based on the HMAC message authentication code. It was initially proposed by its authors as a building block...
to a keyderivationfunction to produce one or more keys to use for encryption and/or MACing of messages. To make unique session and message keys the shared...
is a cryptographic keyderivationfunctionfunction used for password hashing on Fedora, Debian, Ubuntu, and Arch Linux. The function is more resistant...
set. Because cryptographic hash functions are typically designed to be computed quickly, special keyderivationfunctions that require greater computing...
g^{y}} . Alice then computes a symmetric key k {\displaystyle k} using this information and a keyderivationfunction (KDF) as follows: k = KDF ( g x y ) {\displaystyle...
is rated secure against preimage attacks. Special hashes called keyderivationfunctions have been created to slow searches. See Password cracking. For...
featuring resilience to header corruption, and using the Argon2 keyderivationfunction by default, whereas LUKS1 uses PBKDF2. Conversion between both...
An oblivious pseudorandom function (OPRF) is a cryptographic function, similar to a keyed-hash function, but with the distinction that in an OPRF two...
symmetric key M, Bob first generates a random m with 1 < m < n. He derives his symmetric key M by M = KDF(m), where KDF is a keyderivationfunction, such...
authentication. The simplest such pairwise independent hash function is defined by the random key, key = (a, b), and the MAC tag for a message m is computed...
Group Key Management Architecture, which discusses the challenges of group key management. Dynamic secrets Hardware security Key ceremony Keyderivation function...
user's password. The password entered by the user is run through a keyderivationfunction to create a hashed version of the new password, which is saved...