Jump to content

rudenaggar

Members
  • Content Count

    1
  • Joined

  • Last visited

Community Reputation

0 Neutral

About rudenaggar

  • Rank
    Newbie
  1. Using RFC2898DeriveBytes with a non trivial iteration count should be better than using a straight hash function for authentication purposes. The Rfc2898DeriveBytes class can be used to produce a derived key from a base key and other parameters. Rfc2898DeriveBytes is an implementation of PBKDF2. PBKDF2 uses a pseudorandom function and a configurable number of iterations to derive a cryptographic key from a password. Because this process is difficult to reverse but can also be configured to be slow to compute, key derivation functions are ideally suited for password hashing use cases. More about...Password Encryption Ruden
×
×
  • Create New...