Key derivation function: Difference between revisions

Content deleted Content added
Undid revision 1262022584 by 201.142.142.159 (talk) vandalism
Password hashing: password verification by hash comparison https://en.m.wikipedia.org/w/index.php?title=Cryptographic_hash_bgfhfunction&action=edit&redlink=1
Tags: Reverted Mobile edit Mobile web edit
Line 37:
 
== Password hashing ==
Despite their original use for key derivation, KDFs are possibly better known for their use in '''password hashing''' ([[cryptographic hash functionbgfhfunction#Password verification|password verification by hash comparison]]), as used by the [[passwd]] file or [[shadow password]] file. Password hash functions should be relatively expensive to calculate in case of brute-force attacks, and the [[key stretching]] of KDFs happen to provide this characteristic.{{citation needed|date=October 2017}} The non-secret parameters are called "[[salt (cryptography)|salt]]" in this context.
 
In 2013 a [[Password Hashing Competition]] was announced to choose a new, standard algorithm for password hashing. On 20 July 2015 the competition ended and [[Argon2]] was announced as the final winner. Four other algorithms received special recognition: Catena, [[Lyra2]], Makwa and [[yescrypt]].<ref>[https://password-hashing.net/ "Password Hashing Competition"]</ref>