Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/thsmi/sieve.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorThomas Schmid <schmid-thomas@gmx.net>2011-11-21 00:49:53 +0400
committerThomas Schmid <schmid-thomas@gmx.net>2011-11-21 00:49:53 +0400
commit79291f42dbf6b12d4c69a703642ef12ad9ab3825 (patch)
tree77126b663cc257bf525e319b865ead468e562e83 /docs
parent92f1ea9c7641492a15ee29b6509a991f5896aec2 (diff)
Update Documentation
Diffstat (limited to 'docs')
-rw-r--r--docs/[rfc6070] PBKDF2 Test Vectors/rfc6070.txt283
1 files changed, 283 insertions, 0 deletions
diff --git a/docs/[rfc6070] PBKDF2 Test Vectors/rfc6070.txt b/docs/[rfc6070] PBKDF2 Test Vectors/rfc6070.txt
new file mode 100644
index 00000000..67cd340b
--- /dev/null
+++ b/docs/[rfc6070] PBKDF2 Test Vectors/rfc6070.txt
@@ -0,0 +1,283 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) S. Josefsson
+Request for Comments: 6070 SJD AB
+Category: Informational January 2011
+ISSN: 2070-1721
+
+
+ PKCS #5: Password-Based Key Derivation Function 2 (PBKDF2)
+ Test Vectors
+
+Abstract
+
+ This document contains test vectors for the Public-Key Cryptography
+ Standards (PKCS) #5 Password-Based Key Derivation Function 2 (PBKDF2)
+ with the Hash-based Message Authentication Code (HMAC) Secure Hash
+ Algorithm (SHA-1) pseudorandom function.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc6070.
+
+Copyright Notice
+
+ Copyright (c) 2011 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+
+
+Josefsson Informational [Page 1]
+
+RFC 6070 PKCS #5 PBKDF2 Test Vectors January 2011
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 2. PBKDF2 HMAC-SHA1 Test Vectors ...................................2
+ 3. Acknowledgements ................................................4
+ 4. Copying Conditions ..............................................4
+ 5. Security Considerations .........................................4
+ 6. References ......................................................4
+ 6.1. Normative References .......................................4
+ 6.2. Informative References .....................................5
+
+1. Introduction
+
+ The Public-Key Cryptography Standards (PKCS) #5 [RFC2898] Password-
+ Based Key Derivation Function 2 (PBKDF2) is used by several protocols
+ to derive encryption keys from a password.
+
+ For example, Salted Challenge Response Authentication Mechanism
+ (SCRAM) [RFC5802] uses PBKDF2 with Hash-based Message Authentication
+ Code (HMAC) [RFC2104] and Secure Hash Algorithm (SHA-1)
+ [FIPS.180-1.1995].
+
+ Test vectors for the algorithm were not included in the original
+ specification, but are often useful for implementers. This document
+ addresses the shortcoming.
+
+2. PBKDF2 HMAC-SHA1 Test Vectors
+
+ The input strings below are encoded using ASCII [ANSI.X3-4.1986].
+ The sequence "\0" (without quotation marks) means a literal ASCII NUL
+ value (1 octet). "DK" refers to the Derived Key.
+
+ Input:
+ P = "password" (8 octets)
+ S = "salt" (4 octets)
+ c = 1
+ dkLen = 20
+
+ Output:
+ DK = 0c 60 c8 0f 96 1f 0e 71
+ f3 a9 b5 24 af 60 12 06
+ 2f e0 37 a6 (20 octets)
+
+
+
+
+
+
+
+
+
+Josefsson Informational [Page 2]
+
+RFC 6070 PKCS #5 PBKDF2 Test Vectors January 2011
+
+
+ Input:
+ P = "password" (8 octets)
+ S = "salt" (4 octets)
+ c = 2
+ dkLen = 20
+
+ Output:
+ DK = ea 6c 01 4d c7 2d 6f 8c
+ cd 1e d9 2a ce 1d 41 f0
+ d8 de 89 57 (20 octets)
+
+
+ Input:
+ P = "password" (8 octets)
+ S = "salt" (4 octets)
+ c = 4096
+ dkLen = 20
+
+ Output:
+ DK = 4b 00 79 01 b7 65 48 9a
+ be ad 49 d9 26 f7 21 d0
+ 65 a4 29 c1 (20 octets)
+
+
+ Input:
+ P = "password" (8 octets)
+ S = "salt" (4 octets)
+ c = 16777216
+ dkLen = 20
+
+ Output:
+ DK = ee fe 3d 61 cd 4d a4 e4
+ e9 94 5b 3d 6b a2 15 8c
+ 26 34 e9 84 (20 octets)
+
+
+ Input:
+ P = "passwordPASSWORDpassword" (24 octets)
+ S = "saltSALTsaltSALTsaltSALTsaltSALTsalt" (36 octets)
+ c = 4096
+ dkLen = 25
+
+ Output:
+ DK = 3d 2e ec 4f e4 1c 84 9b
+ 80 c8 d8 36 62 c0 e4 4a
+ 8b 29 1a 96 4c f2 f0 70
+ 38 (25 octets)
+
+
+
+
+Josefsson Informational [Page 3]
+
+RFC 6070 PKCS #5 PBKDF2 Test Vectors January 2011
+
+
+ Input:
+ P = "pass\0word" (9 octets)
+ S = "sa\0lt" (5 octets)
+ c = 4096
+ dkLen = 16
+
+ Output:
+ DK = 56 fa 6a a7 55 48 09 9d
+ cc 37 d7 f0 34 25 e0 c3 (16 octets)
+
+3. Acknowledgements
+
+ Barry Brachman and Love Hornquist Astrand confirmed the test vectors
+ (using independent implementations) and pointed out a mistake in the
+ salt octet length count.
+
+4. Copying Conditions
+
+ This document should be considered a Code Component and is thus
+ available under the BSD license.
+
+5. Security Considerations
+
+ The security considerations in [RFC2898] apply. This document does
+ not introduce any new security considerations.
+
+6. References
+
+6.1. Normative References
+
+ [ANSI.X3-4.1986]
+ American National Standards Institute, "Coded Character
+ Set - 7-bit American Standard Code for Information
+ Interchange", ANSI X3.4, 1986.
+
+ [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-
+ Hashing for Message Authentication", RFC 2104,
+ February 1997.
+
+ [RFC2898] Kaliski, B., "PKCS #5: Password-Based Cryptography
+ Specification Version 2.0", RFC 2898, September 2000.
+
+ [FIPS.180-1.1995]
+ National Institute of Standards and Technology, "Secure
+ Hash Standard", FIPS PUB 180-1, April 1995,
+ <http://www.itl.nist.gov/fipspubs/fip180-1.htm>.
+
+
+
+
+
+Josefsson Informational [Page 4]
+
+RFC 6070 PKCS #5 PBKDF2 Test Vectors January 2011
+
+
+6.2. Informative References
+
+ [RFC5802] Newman, C., Menon-Sen, A., Melnikov, A., and N. Williams,
+ "Salted Challenge Response Authentication Mechanism
+ (SCRAM) SASL and GSS-API Mechanisms", RFC 5802,
+ July 2010.
+
+Author's Address
+
+ Simon Josefsson
+ SJD AB
+ Hagagatan 24
+ Stockholm 113 47
+ SE
+
+ EMail: simon@josefsson.org
+ URI: http://josefsson.org/
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Josefsson Informational [Page 5]
+