Sciweavers

ISW
1997
Springer

Secure Applications of Low-Entropy Keys

14 years 3 months ago
Secure Applications of Low-Entropy Keys
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is the same as the time required to brute-force search a s-bit key stretched by t bits.
John Kelsey, Bruce Schneier, Chris Hall, David Wag
Added 08 Aug 2010
Updated 08 Aug 2010
Type Conference
Year 1997
Where ISW
Authors John Kelsey, Bruce Schneier, Chris Hall, David Wagner
Comments (0)