Skip to content

Commit

Permalink
doc: correct pbkdf2 salt length recommendation
Browse files Browse the repository at this point in the history
According to the linked document: "The length of the randomly-generated
portion of the salt shall be at least 128 bits." [NIST SP 800-132]

PR-URL: #17524
Reviewed-By: Tobias Nießen <[email protected]>
Reviewed-By: Colin Ihrig <[email protected]>
Reviewed-By: Daniel Bevenius <[email protected]>
Reviewed-By: Ben Noordhuis <[email protected]>
Reviewed-By: Luigi Pinca <[email protected]>
  • Loading branch information
willclarktech authored and MylesBorins committed Jan 8, 2018
1 parent 6ba00b8 commit ed4d013
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions doc/api/crypto.md
Original file line number Diff line number Diff line change
Expand Up @@ -1612,7 +1612,7 @@ higher the number of iterations, the more secure the derived key will be,
but will take a longer amount of time to complete.

The `salt` should also be as unique as possible. It is recommended that the
salts are random and their lengths are greater than 16 bytes. See
salts are random and their lengths are at least 16 bytes. See
[NIST SP 800-132][] for details.

Example:
Expand Down Expand Up @@ -1676,7 +1676,7 @@ higher the number of iterations, the more secure the derived key will be,
but will take a longer amount of time to complete.

The `salt` should also be as unique as possible. It is recommended that the
salts are random and their lengths are greater than 16 bytes. See
salts are random and their lengths are at least 16 bytes. See
[NIST SP 800-132][] for details.

Example:
Expand Down

0 comments on commit ed4d013

Please sign in to comment.