首页 | 本学科首页   官方微博 | 高级检索  
     检索      

PBKDF2函数的一种快速实现
引用本文:于飞,李晓华,兰天,吉庆兵,张李军.PBKDF2函数的一种快速实现[J].信息安全与通信保密,2013(12):100-102.
作者姓名:于飞  李晓华  兰天  吉庆兵  张李军
作者单位:[1]保密通信重点实验室,四川成都610041 [2]78179部队,四川都江堰611830
基金项目:国家自然科学基金项目资助(批准号:61309034)
摘    要:PBKDF2是公钥加密标准PKCS#5的一部分,它在各类加密软件和互联网中应用广泛.对基于口令的密钥导出函数PBKDF2的实现进行了分析,给出了该算法的一种快速实现的优化方案.对优化方案进行了理论分析,并针对802.11协议的WPA/WPA2-PSK认证进行了优化方案的实验,均表明优化方案的实现效率是优化前的两倍.通过进一步的分析还发现,依赖于PBKDF2的身份认证方案抵抗暴力攻击的能力最多只有预期的一半,因此应当增加其循环次数.

关 键 词:身份认证  基于口令的密钥导出函数  信息安全

A Novel Fast Implementation of PBKDF2
YU Fei,LI Xiao-hua,LAN Tian,JI Qin-bing,ZHANG Li-jun.A Novel Fast Implementation of PBKDF2[J].China Information Security,2013(12):100-102.
Authors:YU Fei  LI Xiao-hua  LAN Tian  JI Qin-bing  ZHANG Li-jun
Institution:1 Science and Technology on Communication Security Laboratory, Chengdu Sichuan 610041, China; 2PLA Unit 78179, Dujiangyan Sichuan 611830, China)
Abstract:PBKDF2( Password Based Key Derivation Function 2), as a part of Public Key Cryptography Standard #5 by RSA and a key algorithm for identityauthentication in practice, is widely used in eneryption software and internet. This paper analyzes the implementation of PBKDF2 and proposes a novel optimized implementation scheme. Both theoretical analysis and experiment on WPA/WPA2-PSK authentication of 802.11 standard indicate that the proposed scheme is of a 2-fold increase in efficiency as compared with the original scheme, and that the ability of identity authentication based on PBKDF2 against brute-force attack is at most as half as the expected. Thus the increase of its iteration number is a must.
Keywords:identity authentication  PBKDF2  information security
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号