A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
2018
IEEE Transactions on Dependable and Secure Computing
PBKDF2 [27] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPUintensive operations based on an iterated pseudorandom function (in our case HMAC-SHA-1). If we are able to speed up a SHA-1 or an HMAC implementation, we are able to speed up PBKDF2-HMAC-SHA-1. This means that a performance improvement might be exploited by regular users and attackers. Interestingly, suggests that it is possible to precompute first message block of a keyed
doi:10.1109/tdsc.2018.2878697
fatcat:3szuzg5cfjf7hh5npf4oq62i2i