Bitcoin Forum
May 22, 2024, 01:44:03 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: PBKDF2 Iterations - BlockChain.Info Wallet  (Read 1407 times)
marcotheminer (OP)
Legendary
*
Offline Offline

Activity: 2072
Merit: 1049


┴puoʎǝq ʞool┴


View Profile
December 24, 2014, 11:44:28 AM
 #1

What exactly does "PBKDF2 Iterations" represent?

The site says:
Quote
PBKDF2 is a function which stretches your password increasing the effort required to bruteforce it. A higher number of iterations is better however you may notice a slow down of your browser.

What does that mean exactly?
marcotheminer (OP)
Legendary
*
Offline Offline

Activity: 2072
Merit: 1049


┴puoʎǝq ʞool┴


View Profile
December 26, 2014, 01:16:17 PM
 #2

Anyone?
s1ng
Legendary
*
Offline Offline

Activity: 1218
Merit: 1001


View Profile
December 26, 2014, 04:09:42 PM
 #3

What exactly does "PBKDF2 Iterations" represent?

The site says:
Quote
PBKDF2 is a function which stretches your password increasing the effort required to bruteforce it. A higher number of iterations is better however you may notice a slow down of your browser.

What does that mean exactly?

On my opinion,
Streches mean "make it long" or increase more char
So if password is being stretches , it will need more time to crack down the password eventhough using bruteforce method.

marcotheminer (OP)
Legendary
*
Offline Offline

Activity: 2072
Merit: 1049


┴puoʎǝq ʞool┴


View Profile
December 28, 2014, 09:31:30 AM
 #4

Bump.
bigbeninlondon
Hero Member
*****
Offline Offline

Activity: 742
Merit: 500



View Profile
February 06, 2015, 08:42:33 PM
 #5

PBKFD2 Stands for "Password Based Key Derivation Function (the second one).

The idea is that you take a string of any length (the password) and a salt (if you want) and generate a standard length key.  The standard for PBKFD2 can be found here: http://www.ietf.org/rfc/rfc2898.txt.  As for the iterations; inside the PBKFD2 it performs a hash against your data.  It can then, if you desire, hash the hash.  That's an "additional iteration".  The more iterations you do, the further from the key your password becomes, but the more number crunching you have to do.

Does that help?
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!