public class PBKDF2
extends tr.gov.tubitak.uekae.esya.api.common.crypto.BasePRNG
implements java.lang.Cloneable
An implementation of the key derivation function KDF2 from PKCS #5: Password-Based Cryptography (PBE). This KDF is essentially a way to transform a password and a salt into a stream of random bytes, which may then be used to initialize a cipher or a MAC.
This version uses a MAC as its pseudo-random function, and the password is used as the key.
References:
Constructor and Description |
---|
PBKDF2(IMac mac)
Creates a new PBKDF2 object.
|
Modifier and Type | Method and Description |
---|---|
java.lang.Object |
clone() |
void |
fillBlock() |
void |
setup(java.util.Map attributes) |
public PBKDF2(IMac mac)
Creates a new PBKDF2 object. The argument is the MAC that will serve as the pseudo-random function. The MAC does not need to be initialized.
mac
- The pseudo-random function.public java.lang.Object clone()
clone
in interface tr.gov.tubitak.uekae.esya.api.common.crypto.IRandom
clone
in class tr.gov.tubitak.uekae.esya.api.common.crypto.BasePRNG
public void setup(java.util.Map attributes)
setup
in class tr.gov.tubitak.uekae.esya.api.common.crypto.BasePRNG
public void fillBlock() throws tr.gov.tubitak.uekae.esya.api.common.crypto.LimitReachedException
fillBlock
in class tr.gov.tubitak.uekae.esya.api.common.crypto.BasePRNG
tr.gov.tubitak.uekae.esya.api.common.crypto.LimitReachedException
Copyright © 2025. All rights reserved.