Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Key stretching

Index Key stretching

In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the time it takes to test each possible key. [1]

48 relations: Apache HTTP Server, Argon2, ASCII, Bcrypt, Block cipher, Brute-force attack, Cache (computing), Comparison of disk encryption software, Crypt (C), Cryptographic hash function, Cryptography, Custom hardware attack, Data Encryption Standard, Disk encryption software, Encryption, Field-programmable gate array, Free and open-source software, GNU Privacy Guard, Hash chain, Hashcash, KeePass, KeePassX, Key (cryptography), Key derivation function, Key schedule, Loop unrolling, MD5, Memory bound function, Moore's law, OpenSSL, Passphrase, Password, Password cracking, Password Hashing Competition, Password manager, Password Safe, PBKDF2, PDP-11, Personal computer, Pretty Good Privacy, Robert Morris (cryptographer), Salt (cryptography), Scrypt, SHA-1, Space–time tradeoff, Unix, Wi-Fi Protected Access, .htpasswd.

Apache HTTP Server

The Apache HTTP Server, colloquially called Apache, is a free and open-source cross-platform web server, released under the terms of Apache License 2.0.

New!!: Key stretching and Apache HTTP Server · See more »

Argon2

Argon2 is a key derivation function that was selected as the winner of the Password Hashing Competition in July 2015.

New!!: Key stretching and Argon2 · See more »

ASCII

ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication.

New!!: Key stretching and ASCII · See more »

Bcrypt

bcrypt is a password hashing function designed by Niels Provos and David Mazières, based on the Blowfish cipher, and presented at USENIX in 1999.

New!!: Key stretching and Bcrypt · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Key stretching and Block cipher · See more »

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: Key stretching and Brute-force attack · See more »

Cache (computing)

In computing, a cache, is a hardware or software component that stores data so future requests for that data can be served faster; the data stored in a cache might be the result of an earlier computation, or the duplicate of data stored elsewhere.

New!!: Key stretching and Cache (computing) · See more »

Comparison of disk encryption software

This is a technical feature comparison of different disk encryption software.

New!!: Key stretching and Comparison of disk encryption software · See more »

Crypt (C)

crypt is the library function which is used to compute a password hash that can be used to store user account passwords while keeping them relatively secure (a passwd file).

New!!: Key stretching and Crypt (C) · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Key stretching and Cryptographic hash function · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Key stretching and Cryptography · See more »

Custom hardware attack

In cryptography, a custom hardware attack uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages.

New!!: Key stretching and Custom hardware attack · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Key stretching and Data Encryption Standard · See more »

Disk encryption software

Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption.

New!!: Key stretching and Disk encryption software · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Key stretching and Encryption · See more »

Field-programmable gate array

A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturing hence "field-programmable".

New!!: Key stretching and Field-programmable gate array · See more »

Free and open-source software

Free and open-source software (FOSS) is software that can be classified as both free software and open-source software.

New!!: Key stretching and Free and open-source software · See more »

GNU Privacy Guard

GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite.

New!!: Key stretching and GNU Privacy Guard · See more »

Hash chain

A hash chain is the successive application of a cryptographic hash function to a piece of data.

New!!: Key stretching and Hash chain · See more »

Hashcash

Hashcash is a proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin (and other cryptocurrencies) as part of the mining algorithm.

New!!: Key stretching and Hashcash · See more »

KeePass

KeePass Password Safe is a free and open-source password manager primarily for Windows.

New!!: Key stretching and KeePass · See more »

KeePassX

KeePassX started as a Linux port of KeePass, which was at that time an open source but Windows-only password manager.

New!!: Key stretching and KeePassX · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Key stretching and Key (cryptography) · See more »

Key derivation function

In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

New!!: Key stretching and Key derivation function · See more »

Key schedule

In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds.

New!!: Key stretching and Key schedule · See more »

Loop unrolling

Loop unrolling, also known as loop unwinding, is a loop transformation technique that attempts to optimize a program's execution speed at the expense of its binary size, which is an approach known as space–time tradeoff.

New!!: Key stretching and Loop unrolling · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: Key stretching and MD5 · See more »

Memory bound function

Memory bound refers to a situation in which the time to complete a given computational problem is decided primarily by the amount of memory required to hold data.

New!!: Key stretching and Memory bound function · See more »

Moore's law

Moore's law is the observation that the number of transistors in a dense integrated circuit doubles about every two years.

New!!: Key stretching and Moore's law · See more »

OpenSSL

OpenSSL is a software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end.

New!!: Key stretching and OpenSSL · See more »

Passphrase

A passphrase is a sequence of words or other text used to control access to a computer system, program or data.

New!!: Key stretching and Passphrase · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Key stretching and Password · See more »

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

New!!: Key stretching and Password cracking · See more »

Password Hashing Competition

The Password Hashing Competition was an open competition announced in 2013 to select one or more password hash functions that can be recognized as a recommended standard.

New!!: Key stretching and Password Hashing Competition · See more »

Password manager

A password manager assists in generating and retrieving complex passwords, potentially storing such passwords in an encrypted database or calculating them on demand.

New!!: Key stretching and Password manager · See more »

Password Safe

Password Safe is a free and open-source password manager program for use with Microsoft Windows.

New!!: Key stretching and Password Safe · See more »

PBKDF2

In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 2) are key derivation functions with a sliding computational cost, aimed to reduce the vulnerability of encrypted keys to brute force attacks.

New!!: Key stretching and PBKDF2 · See more »

PDP-11

The PDP-11 is a series of 16-bit minicomputers sold by Digital Equipment Corporation (DEC) from 1970 into the 1990s, one of a succession of products in the PDP series.

New!!: Key stretching and PDP-11 · See more »

Personal computer

A personal computer (PC) is a multi-purpose computer whose size, capabilities, and price make it feasible for individual use.

New!!: Key stretching and Personal computer · See more »

Pretty Good Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.

New!!: Key stretching and Pretty Good Privacy · See more »

Robert Morris (cryptographer)

Robert H. Morris Sr. (July 25, 1932 – June 26, 2011) was an American cryptographer and computer scientist.

New!!: Key stretching and Robert Morris (cryptographer) · See more »

Salt (cryptography)

In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.

New!!: Key stretching and Salt (cryptography) · See more »

Scrypt

In cryptography, scrypt (pronounced "ess crypt") is a password-based key derivation function created by Colin Percival, originally for the Tarsnap online backup service.

New!!: Key stretching and Scrypt · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: Key stretching and SHA-1 · See more »

Space–time tradeoff

A space–time or time–memory trade-off in computer science is a case where an algorithm or program trades increased space usage with decreased time.

New!!: Key stretching and Space–time tradeoff · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Key stretching and Unix · See more »

Wi-Fi Protected Access

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.

New!!: Key stretching and Wi-Fi Protected Access · See more »

.htpasswd

.htpasswd is a flat-file used to store usernames and password for basic authentication on an Apache HTTP Server.

New!!: Key stretching and .htpasswd · See more »

Redirects here:

Key expansion, Key extension, Key strengthening, Keystrengthening, Passphrase strengthening, Password strengthening.

References

[1] https://en.wikipedia.org/wiki/Key_stretching

OutgoingIncoming
Hey! We are on Facebook now! »