RFC 2898 Password-Based Cryptography September 2000 Table of Contents 1. Introduction ............................................... 3 2. Notation ................................................... 3 3. Overview ................................................... 4 4. Salt and iteration count ................................... 6 4.1 Salt ................................................... 6 4.2 Iteration count ........................................ 8 5. Key derivation functions ................................... 8 5.1 PBKDF1 ................................................. 9 5.2 PBKDF2 ................................................. 9 6. Encryption schemes ......................................... 11 6.1 PBES1 .................................................. 12 6.1.1 Encryption operation ............................ 12 6.1.2 Decryption operation ............................ 13 6.2 PBES2 .................................................. 14 6.2.1 Encryption operation ............................ 14 6.2.2 Decryption operation ............................ 15 7. Message authentication schemes ............................. 15 7.1 PBMAC1 ................................................. 16 7.1.1 MAC generation .................................. 16 7.1.2 MAC verification ................................ 16 8. Security Considerations .................................... 17 9. Author's Address............................................ 17 A. ASN.1 syntax ............................................... 18 A.1 PBKDF1 ................................................. 18 A.2 PBKDF2 ................................................. 18 A.3 PBES1 .................................................. 20 A.4 PBES2 .................................................. 20 A.5 PBMAC1 ................................................. 21 B. Supporting techniques ...................................... 22 B.1 Pseudorandom functions ................................. 22 B.2 Encryption schemes ..................................... 23 B.3 Message authentication schemes ......................... 26 C. ASN.1 module ............................................... 26 Intellectual Property Considerations ............................ 30 Revision history ................................................ 30 References ...................................................... 31 Contact Information & About PKCS ................................ 33 Full Copyright Statement ........................................ 34 Kaliski Informational