pbkdf2

How to use PBKDF2 in Oracle 12c?

馋奶兔 提交于 2019-12-04 13:47:52
问题 We want to save user passwords in Oracle 12c. I found the dbms_crypto -Package but there was no information about PBKDF2. What's the current state in 2017 to use PBKDF2 in Oracle 12c? 回答1: This is a late answer, but to the best of my knowledge Oracle's DBMS_CRYPTO package does not support PBKDF2 natively. That said, you can implement the algorithm yourself; here is one way to do it: CREATE OR REPLACE FUNCTION pbkdf2 ( p_password IN VARCHAR2 , p_salt IN VARCHAR2 , p_count IN INTEGER , p_key

Utilizing PBKDF2 with OpenSSL library

强颜欢笑 提交于 2019-12-04 12:31:20
问题 This question was migrated from Information Security Stack Exchange because it can be answered on Stack Overflow. Migrated 5 years ago . I want to utilize the PBKDF2 algorithm with SHA1 HMAC (based on this answer). How can I utilize this through the crypto library? I started by looking at man openssl , but the openssl passwd command (man page) only supports a small handful of algorithms. Looking at the crypto documentation, the evp module has an EVP_BytesToKey method. Careful selection of the

.NET: Difference between PasswordDeriveBytes and Rfc2898DeriveBytes

孤街醉人 提交于 2019-12-04 10:31:16
问题 I'm trying to understand some C#-code, I have been handed, which deals with cryptography, and specifically uses PasswordDeriveBytes from System.Security.Cryptography . In the .NET docs , it says that PasswordDeriveBytes uses "an extension of the PBKDF1 algorithm" which is later in the document specified as "the PKCS#5 v2.0 standard", which is PBKDF2 (as far as I can tell). Everywhere on the net I've found (including here on Stack Exchange), though, everyone says "use Rfc2898DeriveBytes, cause

Rfc2898DeriveBytes + PBKDF2 + SecureString is it possible to use a secure string instead of a string?

大城市里の小女人 提交于 2019-12-04 08:21:56
I've a function GetPassword , that returns a SecureString type. When I pass this secure string to Rfc2898DeriveBytes to generate a key, Visual Studio shows an error. My limited knowledge tells me that it is because Rfc2898DeriveBytes accepts only a string and not a secure string. Is there a workaround to this? //read the password from terminal Console.Write("Insert password"); securePwd = myCryptography.GetPassword(); //dont know why the salt is initialized like this byte[] salt = new byte[] { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0xF1, 0xF0, 0xEE, 0x21, 0x22, 0x45 }; try { //PBKDF2

Is SHA1 still secure for use as hash function in PBKDF2?

你说的曾经没有我的故事 提交于 2019-12-04 02:30:33
As there have been significant advances in the cryptoanalysis of SHA1 it's supposed to be phased out in favor of SHA2 ( wikipedia ). For use as underlying hash function in PBKDF2, however, it's basically used as a PRNG. As such it should be still secure to use SHA1 as hash for PBKDF2, right? None of the currently known weaknesses on SHA-1 has any impact on its security when used in HMAC, a fortiori when used in PBKDF2. For that matter, MD5 would be fine too (but not MD4). However, SHA-1 is not good for public relations: if, in 2011, you use SHA-1, then you must prepare yourself to have to

About how fast can you brute force PBKDF2?

吃可爱长大的小学妹 提交于 2019-12-04 02:05:13
After the linkedin password hash leak, I've been looking at our password hashing. We using Django 1.4 which uses PBKDF2, which is great and a step up from the previous SHA1. However I'm curious how easily one could brute force that. I'm looking at our password complexity rules, and am wondering how fast it'd take to do (say) 8 length lower case ascii letters. This guide to cracking the LinkedIn password hash, has someone doing 430 million sha1 hashes per second on a GPU. http://erratasec.blogspot.ie/2012/06/linkedin-vs-password-cracking.html What kinda speeds would you get for PBKDF2? Does

How can I hash a password in Tornado with minimal blocking?

时光怂恿深爱的人放手 提交于 2019-12-03 21:14:08
I'm using PBKDF2 , but this applies equally to BCrypt. Hashing a password with a reasonable number of iterations can easily block for 0.5 seconds. What is a lightweight way to take this out of process? I'm reluctant to setup something like Celery or Gearman just for this operation. You could use a thread. This will not block tornado. Say that you have a handler that hashes passwords. Then the two relevant methods might look like this: import threading def on_message(self, message): # pull out user and password from message somehow thread = threading.Thread(target=self.hash_password, args=(user

PBEKeySpec what do the iterationCount and keyLength parameters influence?

浪尽此生 提交于 2019-12-03 16:25:21
问题 Delving into the java encryption and hashing world I see examples of the constructor for the PBEKeySpec class with various values for the iterationCount and the keyLength parameters. Nothing seems to explain what these parameters impact or mean. I am assuming that keyLength is how long the key is so 32 bit encryption would take a value of 32 for the key length, but that assumption feels wrong. My guess for the iterationCount is the number of times each char is encrypted, again not feeling the

Utilizing PBKDF2 with OpenSSL library

半腔热情 提交于 2019-12-03 08:58:49
I want to utilize the PBKDF2 algorithm with SHA1 HMAC (based on this answer). How can I utilize this through the crypto library? I started by looking at man openssl , but the openssl passwd command ( man page ) only supports a small handful of algorithms. Looking at the crypto documentation, the evp module has an EVP_BytesToKey method. Careful selection of the parameters will provide a PKCS#5 PBKDF1 compatible implementation. However, new applications should not typically use this (preferring, for example, PBKDF2 from PCKS#5). Which brings me back to my original question, how do I utilize

.NET: Difference between PasswordDeriveBytes and Rfc2898DeriveBytes

大憨熊 提交于 2019-12-03 06:54:10
I'm trying to understand some C#-code, I have been handed, which deals with cryptography, and specifically uses PasswordDeriveBytes from System.Security.Cryptography . In the .NET docs , it says that PasswordDeriveBytes uses "an extension of the PBKDF1 algorithm" which is later in the document specified as "the PKCS#5 v2.0 standard", which is PBKDF2 (as far as I can tell). Everywhere on the net I've found (including here on Stack Exchange), though, everyone says "use Rfc2898DeriveBytes, cause Password* is deprecated and uses PBKDF1". But the only difference in the docs at msdn.microsoft.com