Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 10 Jul 2013 13:31:22 +0200
From: magnum <>
Subject: Re: PBKDF2 hash_out treatment

On 10 Jul, 2013, at 12:21 , marcus.desto <> wrote:
> Hi Alexander,

That's not me :-)  My name is magnum (and only that - the "john" in my email address just refers to JtR).

>> Also, I'm not sure but I would assume the mscash2-opencl format does not support an iteration count of 1, again because of optimizations.
> I am using not the mscash2-open opencl implementation.

OK. I think is better for your intentions and I'm pretty sure it does support running just one iteration. I also think it will return a normal byte sequence and it should be trivial to unpack it to a standard hex string.

Here's a test vector for pbkdf2-hmac-sha1 at one iteration:

       P = "password" (8 octets)
       S = "salt" (4 octets)
       c = 1
       dkLen = 20

       DK = 0c 60 c8 0f 96 1f 0e 71
            f3 a9 b5 24 af 60 12 06
            2f e0 37 a6             (20 octets)

I take it your intention is to get that as a hex string of "0c60c80f961f0e71f3a9b524af6012062fe037a6", right?

Please post a complete python program, as short/clean as possible, that just calculates this hard-coded test vector and prints the output, first using some prefab Python CPU function, and then (trying to) using I'm sure we can help you get it straight from there.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.