diff options
Diffstat (limited to 'doc/rfc/rfc6070.txt')
-rw-r--r-- | doc/rfc/rfc6070.txt | 283 |
1 files changed, 283 insertions, 0 deletions
diff --git a/doc/rfc/rfc6070.txt b/doc/rfc/rfc6070.txt new file mode 100644 index 0000000..67cd340 --- /dev/null +++ b/doc/rfc/rfc6070.txt @@ -0,0 +1,283 @@ + + + + + + +Internet Engineering Task Force (IETF) S. Josefsson +Request for Comments: 6070 SJD AB +Category: Informational January 2011 +ISSN: 2070-1721 + + + PKCS #5: Password-Based Key Derivation Function 2 (PBKDF2) + Test Vectors + +Abstract + + This document contains test vectors for the Public-Key Cryptography + Standards (PKCS) #5 Password-Based Key Derivation Function 2 (PBKDF2) + with the Hash-based Message Authentication Code (HMAC) Secure Hash + Algorithm (SHA-1) pseudorandom function. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6070. + +Copyright Notice + + Copyright (c) 2011 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + + + +Josefsson Informational [Page 1] + +RFC 6070 PKCS #5 PBKDF2 Test Vectors January 2011 + + +Table of Contents + + 1. Introduction ....................................................2 + 2. PBKDF2 HMAC-SHA1 Test Vectors ...................................2 + 3. Acknowledgements ................................................4 + 4. Copying Conditions ..............................................4 + 5. Security Considerations .........................................4 + 6. References ......................................................4 + 6.1. Normative References .......................................4 + 6.2. Informative References .....................................5 + +1. Introduction + + The Public-Key Cryptography Standards (PKCS) #5 [RFC2898] Password- + Based Key Derivation Function 2 (PBKDF2) is used by several protocols + to derive encryption keys from a password. + + For example, Salted Challenge Response Authentication Mechanism + (SCRAM) [RFC5802] uses PBKDF2 with Hash-based Message Authentication + Code (HMAC) [RFC2104] and Secure Hash Algorithm (SHA-1) + [FIPS.180-1.1995]. + + Test vectors for the algorithm were not included in the original + specification, but are often useful for implementers. This document + addresses the shortcoming. + +2. PBKDF2 HMAC-SHA1 Test Vectors + + The input strings below are encoded using ASCII [ANSI.X3-4.1986]. + The sequence "\0" (without quotation marks) means a literal ASCII NUL + value (1 octet). "DK" refers to the Derived Key. + + Input: + P = "password" (8 octets) + S = "salt" (4 octets) + c = 1 + dkLen = 20 + + Output: + DK = 0c 60 c8 0f 96 1f 0e 71 + f3 a9 b5 24 af 60 12 06 + 2f e0 37 a6 (20 octets) + + + + + + + + + +Josefsson Informational [Page 2] + +RFC 6070 PKCS #5 PBKDF2 Test Vectors January 2011 + + + Input: + P = "password" (8 octets) + S = "salt" (4 octets) + c = 2 + dkLen = 20 + + Output: + DK = ea 6c 01 4d c7 2d 6f 8c + cd 1e d9 2a ce 1d 41 f0 + d8 de 89 57 (20 octets) + + + Input: + P = "password" (8 octets) + S = "salt" (4 octets) + c = 4096 + dkLen = 20 + + Output: + DK = 4b 00 79 01 b7 65 48 9a + be ad 49 d9 26 f7 21 d0 + 65 a4 29 c1 (20 octets) + + + Input: + P = "password" (8 octets) + S = "salt" (4 octets) + c = 16777216 + dkLen = 20 + + Output: + DK = ee fe 3d 61 cd 4d a4 e4 + e9 94 5b 3d 6b a2 15 8c + 26 34 e9 84 (20 octets) + + + Input: + P = "passwordPASSWORDpassword" (24 octets) + S = "saltSALTsaltSALTsaltSALTsaltSALTsalt" (36 octets) + c = 4096 + dkLen = 25 + + Output: + DK = 3d 2e ec 4f e4 1c 84 9b + 80 c8 d8 36 62 c0 e4 4a + 8b 29 1a 96 4c f2 f0 70 + 38 (25 octets) + + + + +Josefsson Informational [Page 3] + +RFC 6070 PKCS #5 PBKDF2 Test Vectors January 2011 + + + Input: + P = "pass\0word" (9 octets) + S = "sa\0lt" (5 octets) + c = 4096 + dkLen = 16 + + Output: + DK = 56 fa 6a a7 55 48 09 9d + cc 37 d7 f0 34 25 e0 c3 (16 octets) + +3. Acknowledgements + + Barry Brachman and Love Hornquist Astrand confirmed the test vectors + (using independent implementations) and pointed out a mistake in the + salt octet length count. + +4. Copying Conditions + + This document should be considered a Code Component and is thus + available under the BSD license. + +5. Security Considerations + + The security considerations in [RFC2898] apply. This document does + not introduce any new security considerations. + +6. References + +6.1. Normative References + + [ANSI.X3-4.1986] + American National Standards Institute, "Coded Character + Set - 7-bit American Standard Code for Information + Interchange", ANSI X3.4, 1986. + + [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- + Hashing for Message Authentication", RFC 2104, + February 1997. + + [RFC2898] Kaliski, B., "PKCS #5: Password-Based Cryptography + Specification Version 2.0", RFC 2898, September 2000. + + [FIPS.180-1.1995] + National Institute of Standards and Technology, "Secure + Hash Standard", FIPS PUB 180-1, April 1995, + <http://www.itl.nist.gov/fipspubs/fip180-1.htm>. + + + + + +Josefsson Informational [Page 4] + +RFC 6070 PKCS #5 PBKDF2 Test Vectors January 2011 + + +6.2. Informative References + + [RFC5802] Newman, C., Menon-Sen, A., Melnikov, A., and N. Williams, + "Salted Challenge Response Authentication Mechanism + (SCRAM) SASL and GSS-API Mechanisms", RFC 5802, + July 2010. + +Author's Address + + Simon Josefsson + SJD AB + Hagagatan 24 + Stockholm 113 47 + SE + + EMail: simon@josefsson.org + URI: http://josefsson.org/ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Josefsson Informational [Page 5] + |