[132017] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Generating AES key by hashing login password?

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Sat Aug 30 10:36:27 2008

From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: dan@geek.com.au, muffysw@hotmail.com
Cc: cryptography@metzdowd.com
In-Reply-To: <20080829212008.GK15679@bcd.geek.com.au>
Date: Sat, 30 Aug 2008 15:36:17 +1200

Daniel Carosone <dan@geek.com.au> writes:
>On Fri, Aug 29, 2008 at 09:01:26PM +0000, Muffys Wump wrote:
>> Master Password: hash(hash(login_password))
>> 
>> Would this be a good idea if we've used this generated hash as a key for AES?
>> Would the hashing be secure enough against different kinds of attacks?
>
>You want to look at something like PKCS#5 for generating keys from
>passphrases.

... and specifically PBKDF2, not the original PKCS #5.  See also the
discussion at http://en.wikipedia.org/wiki/Dictionary_attack.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post