Key derivation function: Difference between revisions

Content deleted Content added
Password hashing: password verification by hash comparison https://en.m.wikipedia.org/w/index.php?title=Cryptographic_hash_bgfhfunction&action=edit&redlink=1
Tags: Reverted Mobile edit Mobile web edit
m Reverted edit by 2409:40E4:135C:FB91:96BD:9C4F:36:7FDF (talk) to last version by Jay8g
Line 37:
 
== Password hashing ==
Despite their original use for key derivation, KDFs are possibly better known for their use in '''password hashing''' ([[cryptographic hash bgfhfunctionfunction#Password verification|password verification by hash comparison]]), as used by the [[passwd]] file or [[shadow password]] file. Password hash functions should be relatively expensive to calculate in case of brute-force attacks, and the [[key stretching]] of KDFs happen to provide this characteristic.{{citation needed|date=October 2017}} The non-secret parameters are called "[[salt (cryptography)|salt]]" in this context.
 
In 2013 a [[Password Hashing Competition]] was announced to choose a new, standard algorithm for password hashing. On 20 July 2015 the competition ended and [[Argon2]] was announced as the final winner. Four other algorithms received special recognition: Catena, [[Lyra2]], Makwa and [[yescrypt]].<ref>[https://password-hashing.net/ "Password Hashing Competition"]</ref>