Skip to content

Commit 07c2f6c

Browse files
sydsetercpholguera
andcommitted
Update Document/0x04g-Testing-Cryptography.md
Co-authored-by: Carlos Holguera <perezholguera@gmail.com>
1 parent 92c7f3b commit 07c2f6c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

Document/0x04g-Testing-Cryptography.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ Different KDFs are suitable for different tasks such as:
128128
- Password storage:
129129
- In order to ensure attacker's can't use a stolen password even in the event of a data breach, passwords are stored as hashes computed through a computationally intensive KDF. The ideal password storage's KDF should be demanding on both computational and memory resources.
130130

131-
source: ([Wikipedia, 2025.02.21"](https://en.wikipedia.org/wiki/Key_derivation_function "Key derivation function"))
131+
Source: ([Wikipedia, 2025.02.21"](https://en.wikipedia.org/wiki/Key_derivation_function "Key derivation function"))
132132

133133
When using a KDF for cryptographic operations always ensure to use a recommended and approved KDF properly according to the latest recommendations and the software provider's documentation. E.g Only using a key derivation functions that is constructed from hashes against which no non-trivial pre-image or length-extension attacks are known and where attacking the key derivation function directly is infeasible. Using user-supplied input together with HKDF will make it easy for password crackers to execute a preimage attack.
134134

0 commit comments

Comments
 (0)