Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <8ec0e8993886873292d19b588c9766e5@smtp.hushmail.com>
Date: Fri, 27 Nov 2020 16:36:48 +0100
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: PBKDF2-HMAC-* with non-standard bit-length of the
 derived key?

On 2020-11-27 15:48, Vincent wrote:
> On 27/11/2020 14:56, magnum wrote:
>>> Is it possible to use a custom bit-length of the derived key (mostly 
>>> called dkLen) for the PBKDF2-HMAC-* formats?
>>
>> Do you mean shorter than the native hash length, or longer (multiple 
>> or not)?
> 
> Shorter.

Unfortunately, simply dropping bytes from the tail of the hash (which we 
could trivially make work just fine) will result in false negatives, 
even though the format doesn't reject the hash (tested with 
pbkdf2*sha1). That's a bug, which means we should implement what you 
want while fixing that.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.