Results 1 to 10 of about 1,020 (118)

Key Derivation: A Dynamic PBKDF2 Model for Modern Cryptographic Systems [PDF]

open access: goldCryptography
Traditional key derivation techniques, including the widely adopted PBKDF2, operate with static parameters that do not account for contextual factors such as device capabilities, data sensitivity, or password strength.
Ali Abdullah S Alqahtani
exaly   +5 more sources

Efficient Optimization of MS Office 2013+ Password Cracking and PBKDF2-HMAC-SHA2 on GPUs

open access: goldIEEE Access
The increasing sensitivity of personal information has led to the widespread adoption of encryption technology for unstructured files and various applications.
DongCheon Kim, Seog Chung Seo
exaly   +5 more sources

Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment [PDF]

open access: goldIEEE Access, 2021
Password-Based Key Derivation Function 2 (PBKDF2) is widely used cryptographic algorithm in order to generate secure keys to a password in various occasions. For example, it is used for file encryption and implementation of authentication systems, and so
Hojin Choi, Seog Chung Seo
exaly   +4 more sources

On the Weaknesses of PBKDF2

open access: greenLecture Notes in Computer Science, 2015
Password-based key derivation functions are of particular interest in cryptography because they (a) input a password/passphrase (which usually is short and lacks enough entropy) and derive a cryptographic key; (b) slow down brute force and dictionary attacks as much as possible. In PKCS#5 [17], RSA Laboratories described a password based key derivation
Andrea Visconti
exaly   +5 more sources

Examining PBKDF2 security margin—Case study of LUKS

open access: greenJournal of Information Security and Applications, 2019
Abstract Passwords are widely used to protect our sensitive information or to gain access to specific resources. They should be changed frequently and be strong enough to prevent well-known attacks. Unfortunately, user-chosen passwords are usually short and lack sufficient entropy.
Andrea Visconti, Milan Broz
exaly   +5 more sources

Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2

open access: diamondWasit Journal of Engineering Sciences
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world.
Nada Abdul Aziz Mustafa
doaj   +4 more sources

Image Encryption Using Chaotic Box Partition–Permutation and Modular Diffusion with PBKDF2 Key Derivation

open access: goldJournal of Cybersecurity and Privacy
This work presents a hybrid chaotic–cryptographic image encryption method that integrates a physical two-dimensional delta-kicked oscillator with a PBKDF2-HMAC-SHA256 key derivation function (KDF).
Javier Alberto Vargas Valencia   +4 more
exaly   +5 more sources

Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments [PDF]

open access: closedLecture Notes in Computer Science, 2020
Password-Based Key Derivation Function 2 (PBKDF2) is widely used cryptographic algorithm in order to generate secure keys to a password in various occasions. For example, it is used for file encryption and implementation of authentication systems, and so on.
Hojin Choi, Seog Chung Seo
exaly   +4 more sources

On the Security Analysis of PBKDF2 in OpenOffice [PDF]

open access: diamondJournal of Software, 2015
Xiaochao Li   +8 more
exaly   +3 more sources

AN EFFECTIVE MECHANISM FOR SECURING AND MANAGING PASSWORD USING AES-256 ENCRYPTION & PBKDF2

open access: diamondInternational Journal of Electrical Engineering & Technology, 2021
Rajeshree Khande   +3 more
exaly   +3 more sources

Home - About - Disclaimer - Privacy