Skip to main content

Questions tagged [key-derivation]

In cryptography, a key derivation function (or KDF) derives one or more secret keys from a secret value such as a master key or other known information such as a password or passphrase using a pseudo-random function. Keyed cryptographic hash functions are popular examples of pseudo-random functions used for key derivation.

Filter by
Sorted by
Tagged with
3 votes
2 answers
334 views

Implications of using a stream cipher as KDF

I'm currently working on a network protocol, and I'm exploring efficient ways of generating new unique key/nonce pairs for the AEAD of each packet. I would like it to ensure forward secrecy, which ...
Erik Schlyter's user avatar
3 votes
1 answer
142 views

Does sequential chaining of diverse cryptographic primitives increase resistance to parallel attacks in key derivation?

I'm implementing a key derivation scheme that sequentially chains different cryptographic primitives (SHA-2/3, BLAKE3, Argon2, scrypt, Balloon Hash) with the hypothesis that algorithmic diversity ...
Tobi's user avatar
  • 31
0 votes
1 answer
87 views

How do I get the secret key d1 or d2 if I have d1-d2 and their corresponding signature values?

I have two different signatures $r_1, s_1, z_1$ signed with $d_1$ and $r_2, s_2, z_2$ signed with $d_2$ also I have $d_1-d_2$, my question is there any possibility that I can recover either $d_1$ or $...
иυэł's user avatar
1 vote
1 answer
124 views

Assess this TMTO resistance strategy for a KDF's LUT (Look Up Table) [closed]

So the challenge with memory-hard KDFs is to have a large - preferrably tunable - piece of data that should be stored in memory in its entirety for the duration of the computation, thereby taking up ...
user115528's user avatar
1 vote
0 answers
44 views

Why does SLIP-0010 include the parent public key in HMAC input for child key derivation?

The Public Parent Key to Public Child Key derivation in SLIP-0010, includes the following computation: $$ I = \text{HMAC-SHA512}( \text{Key} = c_{\text{par}}, \text{Data} = \text{ser}_P(K_{\text{par}})...
Peter Altmann's user avatar
4 votes
1 answer
396 views

Practical implications of using HKDF as key combiner

In the paper "Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS" is it stated that HKDF has not been proven to be a key combiner. That means that it could be ...
Maarten Bodewes's user avatar
  • 96.9k
0 votes
2 answers
156 views

Reverse-engineering SQLite encryption: raw key known, but unable to extract decrypted DB

I've been working on a project for about a month now, and I'm completely new to the world of cryptography and reverse engineering. I'm just beginning to explore both static and dynamic analysis (with ...
user avatar
0 votes
2 answers
183 views

Raw AES using OpenSSL 3.x

I'm implementing key derivation for WebRTC / SRTP which uses AES as the PRF function. For this I need "raw" AES - i.e. not CBC or GCM or whatever, there is no IV or NONCE input, just some ...
Kostya Vasilyev's user avatar
2 votes
1 answer
196 views

Are algorithms like Ascon-PRFshort collision resistant?

I'd like to double check my understanding of the collision resistance of a single unkeyed/public permutation call. I'll use two algorithms as examples, namely Ascon-PRFshort and HChaCha20. Ascon-...
samuel-lucas6's user avatar
2 votes
1 answer
312 views

Is Bitlocker's KDF flawed/weak in 2025?

I have been looking into how Bitlocker performs key derivation[1][2] and apparently Bitlocker's PBKDF stretches by performing 1048576 iterations of SHA-256 instead of HMAC-SHA-256 as it's usually done ...
Brickwall's user avatar
2 votes
0 answers
53 views

KeyCombination scheme in NIST SP 800-227 for hybrid cryptography instead of KDF over shared secrets

In NIST SP 800-227 (currently under review) on KEM's there is a specific section on creating a secure Composite KEM. Here a "key combiner algorithm" $\texttt{KeyCombine}$ is being defined to ...
Maarten Bodewes's user avatar
  • 96.9k
2 votes
1 answer
170 views

What's the use of the `delta` parameter in Balloon's hash?

The image below shows Balloon's pseudo code from its paper, and relevant parameters to my question is delta. Question: What is its impact on memory hardness?
caveman's user avatar
  • 721
2 votes
0 answers
59 views

Is there any quantum memory hard key derivation?

Current memory hard key derivation techniques rely on functions that allow for serialisation on tiny memory, except for requiring a quadratic time penalty. But, with Quantum's light-speed defying ...
caveman's user avatar
  • 721
1 vote
1 answer
185 views

What Makes a 2SKD (Two-Secret Key Derivation) Secure?

I'm currently studying the security mechanisms used by 1Password, particularly the Two-Secret Key Derivation (2SKD) sequence as described in section 8.2.1 of their white paper. Here's the specific ...
gradientsearch's user avatar
1 vote
0 answers
65 views

Tweakable Block Ciphers, Nonces and KDF Key Schedules

What is the point of having dedicated tweakable block ciphers in lieu of XEX which does the same? Does this have something to do with why no one uses XEX with a simple counter? The tweak schedule is ...
Amanda Lars's user avatar

15 30 50 per page
1
2 3 4 5
45