public class PBKDF2
extends tr.gov.tubitak.uekae.esya.api.common.crypto.BasePRNG
implements java.lang.Cloneable
An implementation of the key derivation function KDF2 from PKCS #5: Password-Based Cryptography (PBE). This KDF is essentially a way to transform a password and a salt into a stream of random bytes, which may then be used to initialize a cipher or a MAC.
This version uses a MAC as its pseudo-random function, and the password is used as the key.
References:
| Constructor and Description |
|---|
PBKDF2(IMac mac)
Creates a new PBKDF2 object.
|
| Modifier and Type | Method and Description |
|---|---|
java.lang.Object |
clone() |
void |
fillBlock() |
void |
setup(java.util.Map attributes) |
public PBKDF2(IMac mac)
Creates a new PBKDF2 object. The argument is the MAC that will serve as the pseudo-random function. The MAC does not need to be initialized.
mac - The pseudo-random function.public java.lang.Object clone()
clone in interface tr.gov.tubitak.uekae.esya.api.common.crypto.IRandomclone in class tr.gov.tubitak.uekae.esya.api.common.crypto.BasePRNGpublic void setup(java.util.Map attributes)
setup in class tr.gov.tubitak.uekae.esya.api.common.crypto.BasePRNGpublic void fillBlock()
throws tr.gov.tubitak.uekae.esya.api.common.crypto.LimitReachedException
fillBlock in class tr.gov.tubitak.uekae.esya.api.common.crypto.BasePRNGtr.gov.tubitak.uekae.esya.api.common.crypto.LimitReachedExceptionCopyright © 2025. All rights reserved.