48 relations: Apache HTTP Server, Argon2, ASCII, Bcrypt, Block cipher, Brute-force attack, Cache (computing), Comparison of disk encryption software, Crypt (C), Cryptographic hash function, Cryptography, Custom hardware attack, Data Encryption Standard, Disk encryption software, Encryption, Field-programmable gate array, Free and open-source software, GNU Privacy Guard, Hash chain, Hashcash, KeePass, KeePassX, Key (cryptography), Key derivation function, Key schedule, Loop unrolling, MD5, Memory bound function, Moore's law, OpenSSL, Passphrase, Password, Password cracking, Password Hashing Competition, Password manager, Password Safe, PBKDF2, PDP-11, Personal computer, Pretty Good Privacy, Robert Morris (cryptographer), Salt (cryptography), Scrypt, SHA-1, Space–time tradeoff, Unix, Wi-Fi Protected Access, .htpasswd.
Apache HTTP Server
The Apache HTTP Server, colloquially called Apache, is a free and open-source cross-platform web server, released under the terms of Apache License 2.0.
New!!: Key stretching and Apache HTTP Server · See more »
Argon2
Argon2 is a key derivation function that was selected as the winner of the Password Hashing Competition in July 2015.
New!!: Key stretching and Argon2 · See more »
ASCII
ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication.
New!!: Key stretching and ASCII · See more »
Bcrypt
bcrypt is a password hashing function designed by Niels Provos and David Mazières, based on the Blowfish cipher, and presented at USENIX in 1999.
New!!: Key stretching and Bcrypt · See more »
Block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.
New!!: Key stretching and Block cipher · See more »
Brute-force attack
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.
New!!: Key stretching and Brute-force attack · See more »
Cache (computing)
In computing, a cache, is a hardware or software component that stores data so future requests for that data can be served faster; the data stored in a cache might be the result of an earlier computation, or the duplicate of data stored elsewhere.
New!!: Key stretching and Cache (computing) · See more »
Comparison of disk encryption software
This is a technical feature comparison of different disk encryption software.
New!!: Key stretching and Comparison of disk encryption software · See more »
Crypt (C)
crypt is the library function which is used to compute a password hash that can be used to store user account passwords while keeping them relatively secure (a passwd file).
New!!: Key stretching and Crypt (C) · See more »
Cryptographic hash function
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
New!!: Key stretching and Cryptographic hash function · See more »
Cryptography
Cryptography or cryptology (from κρυπτός|translit.
New!!: Key stretching and Cryptography · See more »
Custom hardware attack
In cryptography, a custom hardware attack uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages.
New!!: Key stretching and Custom hardware attack · See more »
Data Encryption Standard
The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.
New!!: Key stretching and Data Encryption Standard · See more »
Disk encryption software
Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption.
New!!: Key stretching and Disk encryption software · See more »
Encryption
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
New!!: Key stretching and Encryption · See more »
Field-programmable gate array
A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturing hence "field-programmable".
New!!: Key stretching and Field-programmable gate array · See more »
Free and open-source software
Free and open-source software (FOSS) is software that can be classified as both free software and open-source software.
New!!: Key stretching and Free and open-source software · See more »
GNU Privacy Guard
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite.
New!!: Key stretching and GNU Privacy Guard · See more »
Hash chain
A hash chain is the successive application of a cryptographic hash function to a piece of data.
New!!: Key stretching and Hash chain · See more »
Hashcash
Hashcash is a proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin (and other cryptocurrencies) as part of the mining algorithm.
New!!: Key stretching and Hashcash · See more »
KeePass
KeePass Password Safe is a free and open-source password manager primarily for Windows.
New!!: Key stretching and KeePass · See more »
KeePassX
KeePassX started as a Linux port of KeePass, which was at that time an open source but Windows-only password manager.
New!!: Key stretching and KeePassX · See more »
Key (cryptography)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
New!!: Key stretching and Key (cryptography) · See more »
Key derivation function
In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.
New!!: Key stretching and Key derivation function · See more »
Key schedule
In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds.
New!!: Key stretching and Key schedule · See more »
Loop unrolling
Loop unrolling, also known as loop unwinding, is a loop transformation technique that attempts to optimize a program's execution speed at the expense of its binary size, which is an approach known as space–time tradeoff.
New!!: Key stretching and Loop unrolling · See more »
MD5
The MD5 algorithm is a widely used hash function producing a 128-bit hash value.
New!!: Key stretching and MD5 · See more »
Memory bound function
Memory bound refers to a situation in which the time to complete a given computational problem is decided primarily by the amount of memory required to hold data.
New!!: Key stretching and Memory bound function · See more »
Moore's law
Moore's law is the observation that the number of transistors in a dense integrated circuit doubles about every two years.
New!!: Key stretching and Moore's law · See more »
OpenSSL
OpenSSL is a software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end.
New!!: Key stretching and OpenSSL · See more »
Passphrase
A passphrase is a sequence of words or other text used to control access to a computer system, program or data.
New!!: Key stretching and Passphrase · See more »
Password
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.
New!!: Key stretching and Password · See more »
Password cracking
In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.
New!!: Key stretching and Password cracking · See more »
Password Hashing Competition
The Password Hashing Competition was an open competition announced in 2013 to select one or more password hash functions that can be recognized as a recommended standard.
New!!: Key stretching and Password Hashing Competition · See more »
Password manager
A password manager assists in generating and retrieving complex passwords, potentially storing such passwords in an encrypted database or calculating them on demand.
New!!: Key stretching and Password manager · See more »
Password Safe
Password Safe is a free and open-source password manager program for use with Microsoft Windows.
New!!: Key stretching and Password Safe · See more »
PBKDF2
In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 2) are key derivation functions with a sliding computational cost, aimed to reduce the vulnerability of encrypted keys to brute force attacks.
New!!: Key stretching and PBKDF2 · See more »
PDP-11
The PDP-11 is a series of 16-bit minicomputers sold by Digital Equipment Corporation (DEC) from 1970 into the 1990s, one of a succession of products in the PDP series.
New!!: Key stretching and PDP-11 · See more »
Personal computer
A personal computer (PC) is a multi-purpose computer whose size, capabilities, and price make it feasible for individual use.
New!!: Key stretching and Personal computer · See more »
Pretty Good Privacy
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.
New!!: Key stretching and Pretty Good Privacy · See more »
Robert Morris (cryptographer)
Robert H. Morris Sr. (July 25, 1932 – June 26, 2011) was an American cryptographer and computer scientist.
New!!: Key stretching and Robert Morris (cryptographer) · See more »
Salt (cryptography)
In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.
New!!: Key stretching and Salt (cryptography) · See more »
Scrypt
In cryptography, scrypt (pronounced "ess crypt") is a password-based key derivation function created by Colin Percival, originally for the Tarsnap online backup service.
New!!: Key stretching and Scrypt · See more »
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.
New!!: Key stretching and SHA-1 · See more »
Space–time tradeoff
A space–time or time–memory trade-off in computer science is a case where an algorithm or program trades increased space usage with decreased time.
New!!: Key stretching and Space–time tradeoff · See more »
Unix
Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.
New!!: Key stretching and Unix · See more »
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.
New!!: Key stretching and Wi-Fi Protected Access · See more »
.htpasswd
.htpasswd is a flat-file used to store usernames and password for basic authentication on an Apache HTTP Server.
New!!: Key stretching and .htpasswd · See more »
Redirects here:
Key expansion, Key extension, Key strengthening, Keystrengthening, Passphrase strengthening, Password strengthening.
References
[1] https://en.wikipedia.org/wiki/Key_stretching