Browse Prior Art Database

PKCS #5: Password-Based Cryptography Specification Version 2.0 (RFC2898)

IP.com Disclosure Number: IPCOM000005017D
Original Publication Date: 2000-Sep-01
Included in the Prior Art Database: 2001-Jul-13
Document File: 35 page(s) / 69K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

B. Kaliski: AUTHOR

Abstract

This memo represents a republication of PKCS #5 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification.

This text was extracted from a ASCII Text document.
This is the abbreviated version, containing approximately 5% of the total text.

Network Working Group B. Kaliski Request for Comments: 2898 RSA Laboratories Category: Informational September 2000

PKCS #5: Password-Based Cryptography Specification

Version 2.0

Status of this Memo

This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (2000). All Rights Reserved.

Abstract

This memo represents a republication of PKCS #5 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification.

This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions, encryption schemes, message-authentication schemes, and ASN.1 syntax identifying the techniques.

The recommendations are intended for general application within computer and communications systems, and as such include a fair amount of flexibility. They are particularly intended for the protection of sensitive information such as private keys, as in PKCS #8 [25]. It is expected that application standards and implementation profiles based on these specifications may include additional constraints.

Other cryptographic techniques based on passwords, such as password- based key entity authentication and key establishment protocols [4][5][26] are outside the scope of this document. Guidelines for the selection of passwords are also outside the scope.

Kaliski Informational [Page 1]

RFC 2898 Password-Based Cryptography September 2000

Table of Contents

1. Introduction ............................................... 3 2. Notation ................................................... 3 3. Overview ................................................... 4 4. Salt and iteration count ................................... 6 4.1 Salt ................................................... 6

4.2 Iteration count ........................................ 8 5. Key derivation functions ................................... 8 5.1 PBKDF1 ................................................. 9

5.2 PBKDF2 ................................................. 9 6. Encryption schemes ......................................... 11 6.1 PBES1 .................................................. 12 6.1.1 Encryption operation ............................ 12

6.1.2 Decryption operation ............................ 13 6.2 PBES2 .................................................. 14 6.2.1 Encryption operation ............................ 14

6.2.2 Decryption operation ............................ 15 7. Message authentication schemes ............................. 15 7.1 PBMAC1 ................................................. 16 7.1.1 MAC generation .................................. 16

7.1.2 MAC verification ................................ 16 8. Security Considerations ........