List of PBKDF2 implementations
List of software that implements or uses the PBKDF2 key derivation standard.
Implementations
- openssl's C implementation
- OpenBSD's C implementation
- PolarSSL's C implementation
- CyaSSL's C implementation
- ActionScript 3.0 implementation
- .NET's built-in function
- C# implementation
- Delphi/Free Pascal implementation
- Erlang implementation
- Go implementation
- PBKDF2 for Haxe
- JavaScript implementations slow, less slow, fast, benchmark
- Java implementation (PBKDF2WithHmacSHA1)
- Python implementation
- Perl implementation (large), (small), (tiny), Native Perl Implementation - no dependency hell
- Ruby's standard library
- Ruby implementation
- REBOL2 implementation
- PHP implementations: native (added in v5.5.0), pure PHP implementation
- Scala implementation
- Common Lisp implementation (Ironclad)
Systems that use PBKDF2
- Wi-Fi Protected Access (WPA and WPA2) used to secure Wi-Fi wireless networks
- Microsoft Windows Data Protection API (DPAPI)[1]
- OpenDocument encryption used in OpenOffice.org
- WinZip's AES Encryption scheme.[2][3]
- Keeper for password hashing.[4]
- LastPass for password hashing.[5][6]
- 1Password for password hashing.[7]
- Dashlane for password hashing.[8][9]
- Apple's iOS mobile operating system, for protecting user passcodes and passwords.[10]
- Mac OS X Mountain Lion for user passwords
- The Django web framework, as of release 1.4.[11]
- The MODX content management framework, as of version 2.0.
- The encryption and decryption schema of Zend Framework, to generate encryption and authentication keys.[12]
- Cisco IOS and IOS XE Type 4 password hashes[13]
- Firefox Sync for client-side password stretching[14]
Disk encryption software
- Filesystem encryption in the Android operating system, as of version 3.0.[15]
- FileVault (Mac OS X) from Apple Computer[16]
- FreeOTFE (Windows and Pocket PC PDAs); also supports mounting Linux (e.g. LUKS) volumes under Windows
- LUKS (Linux Unified Key Setup) (Linux)
- TrueCrypt (Windows, Linux, and Mac OS X)[17]
- CipherShed (Windows, Linux, and Mac OS X)[18]
- DiskCryptor (Windows)
- Cryptographic disk (NetBSD)
- GEOM ELI module for FreeBSD
- softraid crypto for OpenBSD
- EncFS (Linux, FreeBSD and Mac OS X) since v1.5.0
- GRUB2 (boot loader)
- SafeGuard Enterprise (Windows and Mac OSX)
- Boxcryptor Encryption Software based in EFS
References
- ↑ "Windows Data Protection". NAI Labs, Network Associates, Inc.; Microsoft Corporation. October 2001. Archived from the original on 2007-04-16.
- ↑ "AES Coding Tips for Developers". WinZip. 2008-07-21. Retrieved 2013-09-07.
- ↑ "BRG Main SIte". Winzip.com. Retrieved 2013-09-07.
- ↑ Black, Crystal (2015-03-10). "Keeper: A Fresh Look At Password Management And Data Security". Techaeris. Retrieved 2015-04-16.
- ↑ "Security". LastPass: How We Do It. LastPass. Retrieved 2013-06-13.
- ↑ "LastPass Security Notification". LastPass. 2011-05-04. Retrieved 2013-06-13.
- ↑ "Defending against crackers, PBKDF2". Agilebits, Inc. 2014. Retrieved 2014-11-14.
- ↑ "Our security model in a nutshell". Dashlane, Inc. 2014. Retrieved 2014-03-09.
- ↑ "Protection of User Data in Dashlane" (PDF). Dashlane Security Whitepaper. Dashlane, Inc. November 2011. Retrieved 2014-03-09.
- ↑ iOS security, May 2012, Apple inc.
- ↑ "How Django stores passwords". Django 1.4 documentation. 2012-03-23. Retrieved 31 July 2012.
- ↑ Encrypt/decrypt using block ciphers, Programmer’s Reference Guide of Zend Framework 2.
- ↑ Worldwide. "Cisco Security Response: Cisco IOS and Cisco IOS XE Type 4 Passwords Issue". Tools.cisco.com. Retrieved 2013-09-07.
- ↑ Dan Callahan (2014-04-30). "Firefox Sync’s New Security Model". Mozilla Cloud Services. Mozilla. Retrieved 2015-07-16.
- ↑ Notes on the implementation of encryption in Android 3.0, September 2012, Android Open Source Project.
- ↑ http://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf
- ↑ "Header Key Derivation, Salt, and Iteration Count". TrueCrypt User’s Guide. TrueCrypt Foundation. 2012-02-07. Retrieved 2013-06-08.
- ↑ "CipherShed User's Guide, Technical Details" (PDF). CipherShed User’s Guide. CipherShed Project. 2014-12-19. Retrieved 2014-12-27.
This article is issued from Wikipedia - version of the Tuesday, December 22, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.