Secure applications of low-entropy keys
- Cite this paper as:
- Kelsey J., Schneier B., Hall C., Wagner D. (1998) Secure applications of low-entropy keys. In: Okamoto E., Davida G., Mambo M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is the same as the time required to brute-force search a s-bit key stretched by t bits.
Unable to display preview. Download preview PDF.