Practical security improvement of PKCS#5

Sanghoon Song, Taekyoung Kwon, Ki Song Yoon

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

A public key infrastructure (PKI) is being deployed in a field of network security. PKCS#5 is one of the most popular standards in PKI framework, intended for the practical implementation of password-based cryptography. So, the PKCS#5 encryption must be useful for general software applications within multimedia systems. However, it has a critical weak point in terms of security such as being vulnerable to off-line attacks due to the password-derived encryption key. In this paper, we observe a practical and simple method to improve security of the PKCS#5 encryption without modifying the installed base. The idea is to hide a salt by exploiting several existing schemes.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsAdnan Yazici, Cevat Sener
PublisherSpringer Verlag
Pages869-876
Number of pages8
ISBN (Print)3540204091, 9783540397373
DOIs
Publication statusPublished - 2003

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2869
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Practical security improvement of PKCS#5'. Together they form a unique fingerprint.

  • Cite this

    Song, S., Kwon, T., & Yoon, K. S. (2003). Practical security improvement of PKCS#5. In A. Yazici, & C. Sener (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 869-876). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2869). Springer Verlag. https://doi.org/10.1007/978-3-540-39737-3_108