[14743] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Protection against offline dictionary attack on static files

daemon@ATHENA.MIT.EDU (Ken Ballou)
Thu Nov 13 21:38:53 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 12 Nov 2003 13:29:35 -0500
From: Ken Ballou <ballou@crab.mv.com>
To: cryptography@metzdowd.com
Mail-Followup-To: cryptography@metzdowd.com
In-Reply-To: <3F978143.7070005@ramonsky.com>

On Thu, Oct 23, 2003 at 08:20:35AM +0100, Arcane Jill wrote:
> Hi,
> 
> It's possible I may be reinventing the wheel here,

Not really.  You've just come down with a bad case of the PBEs. ;-)

Take a look at PKCS #5 (here's a link to version 1.5:
ftp://ftp.rsasecurity.com/pub/pkcs/ascii/pkcs-5.asc).  Essentially, it's
the scheme you just described, with provisions for generating more bits
of keying material if the encryption algorithm requires more bits than the
hash algorithm provides.  (For instance, imagine AES with a 256 bit key,
but suppose the hash algorithm is SHA-1, which only produces 160 bits
of output.)

                    - Ken

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post