Question

I have following code in C#

PasswordDeriveBytes DerivedPassword = new PasswordDeriveBytes(Password, SaltValueBytes, HashAlgorithm, PasswordIterations);
byte[] KeyBytes = DerivedPassword.GetBytes(32);

I am using "SHA1" hashing algorithm.

According to SHA1 definition, its generate 160 bits (20 bytes) key. My question is how GetBytes method get 32 bytes from DerivedPassword, what algorithm used behind GetBytes method?

Was it helpful?

Solution

Microsoft's implementation of original PKCS#5 (aka PBKDF1) include insecure extensions to provide more bytes than the hash function can provide (see bug reports here and here).

Even if it was not buggy you should avoid undocumented, proprietary extensions to standards (or you might never be able to decrypt your data in the future - at least not outside Windows.)

I strongly suggest you to use the newer Rfc2898DeriveBytes which implements PBKDF2 (PKCS#5 v2) which is available since .NET 2.0.

OTHER TIPS

what algorithm used behind GetBytes method?

It uses the algorithm PBKDF1, which is slightly modified to allow arbitrary key length. A replacement class, Rfc2898DeriveBytes uses PBKDF2.

You can read the Wikipedia Article on PBKDF2 for a general idea of what underlying concepts are making this work.

The key derivation function uses a feature called Key Stretching. (Don't bother looking it up on Wikipedia, because the current article confuses the concept with Key Strengthening, which is something completely different.)

Key stretching is commonly done by applying a PRF (such as a hash function or a cipher) in either CTR mode, or by iterating it and concatenating the intermediate outputs.

For instance, if you use the CTR procedure, SHA-1 as PRF, and want 32 bytes of pseudo random output, you concatenate SHA1(keymaterial,0) with the first 12 bytes of SHA1(keymaterial,1).

Licensed under: CC-BY-SA with attribution
Not affiliated with StackOverflow
scroll top