NIST Special Publication 800-132 Recommendation for Password-Based Key Derivation Part 1: Storage Applications Meltem Sönmez Turan, Elaine Ba rker, William Burr, and Lily Chen Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Director SP 800-132 Recommendation for Password-Base d Key Derivation December 2010 Abstract This Recommendation specifies techniques for the derivation of master keys from passwords or passphrases to protect stored electro nic data or data protection keys. KEY WORDS: Password-Based Key Derivation Functions, Salt, It eration Count, Protection of data in storage ii SP 800-132 Recommendation for Password-Base d Key Derivation December 2010 Acknowledgements The authors, Meltem Sönmez Turan, Elaine Barker, William Burr, and Lily Chen of the National Institute of Standards and Technology (NIST), w ould like to thank their colleagues at NIST, Shu-jen H. Chang, Morris Dworkin, Allen Rogins ky, and John Kelsey, and also Morgan Stern, Matt Yurkewych, Kevin Igoe, Rich Davis and Chri s Bean of the National Security Agency, for helpful discussions and valuable comments. iii SP 800-132 Recommendation for Password-Base d Key Derivation December 2010 iv Table of Contents 1 ................................................................................................ 1 Introduction 2 .................................................................................................... 1 Authority 3 ......................................................... 2 Definitions, Acronyms and Symbols 3.1 ............................................................................................................ 2 Definitions 3.2 ............................................................................................................. 4 Acronyms 3.3 ................................................................................................................ 4 Symbols 4 .................................................................................... 5 General Discussion 5 .............................................. 5 Password-Based Key Derivation Functions 5.1 .......................................................................................................... 6 The Salt ( S) 5.2 ........................................................................................ 6 The Iteration Count ( C) 5.3 ........................................................................................... 7 PBKDF Specification 5.4 ................................................... 8 Using the Derived Master Key to Protect Data 6 ................................................................................................ 10 References Appendix A Security Considerations ........................................................... 11 A.1 User-Selected Passwords ..................................................................................... 11 A.2 PBKDF ................................................................................................................. 12 A.2.1 Length of the Salt ..................................................................................... 12 A.2.2 Iteration Count ......................................................................................... 12 A.3 .............................................................................................. 14 Protection of DPK Appendix B Conformance to “Non-testable” Requirements ........................ 14 SP 800-132 Recommendation for Password-Based Key Derivation December 2010 Recommendation for Password-Based Key Derivation 1 Int

pdf文档 NIST.SP.800-132

安全标准 > NIST > 文档预览
中文文档 18 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共18页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
NIST.SP.800-132 第 1 页 NIST.SP.800-132 第 2 页 NIST.SP.800-132 第 3 页
下载文档到电脑,方便使用
本文档由 思安2022-12-05 09:14:21上传分享
给文档打分
您好可以输入 255 个字符
网站域名是多少( 答案:github5.com )
评论列表
  • 暂时还没有评论,期待您的金玉良言
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。