Secure Applications of Low-Entropy Keys
J. Kelsey, B. Schneier, C. Hall, and D. Wagner
1997 Information Security Workshop (ISW'97), September 1997, pp. 121-134.
ABSTRACT: We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a (s+t)-bit keyspace is the same as the time required to brute-force search a s-bit key stretched by t bits.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc..