Key Management

Information Security

Volume 1396 of the series Lecture Notes in Computer Science pp 121-134


Secure applications of low-entropy keys

  • John KelseyAffiliated withCounterpane Systems
  • , Bruce SchneierAffiliated withCounterpane Systems
  • , Chris HallAffiliated withCounterpane Systems
  • , David WagnerAffiliated withSoda Hall, C.S. Division, U. C. Berkeley

* Final gross prices may vary according to local VAT.

Get Access


We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is the same as the time required to brute-force search a s-bit key stretched by t bits.