{"id":2019,"date":"2025-10-01T14:31:50","date_gmt":"2025-10-01T20:31:50","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=2019"},"modified":"2025-10-02T01:13:33","modified_gmt":"2025-10-02T07:13:33","slug":"pbkdf2-history-usage-and-future-teaching-aide","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2025\/10\/01\/pbkdf2-history-usage-and-future-teaching-aide\/","title":{"rendered":"PBKDF2 &#8211; History, Usage, and Future &#8211; Teaching Aide"},"content":{"rendered":"\n<p>GitHub link to the website code: <a href=\"https:\/\/github.com\/Benedict-Kpaduwa\/PBKDF2-Project\/\">https:\/\/github.com\/Benedict-Kpaduwa\/PBKDF2-Project\/<\/a><\/p>\n\n\n\n<p>Storing and transmitting information securely, as well as ensuring its integrity, authenticity, and confidentiality are some of the most important problems faced within a field of cryptography. There are all kinds of encrypting, hashing and signing algorithms, all relying on some secret password. <\/p>\n\n\n\n<p>One of the biggest problems of these password is the human factor. Many people tend to choose these in a way that is easy to remember, reuse them in different settings (platforms, accounts, at work and at home).<\/p>\n\n\n\n<p>A way to mitigate this is to derive a complex key from a password in such a way, that reverting the said key back into the secret password would either be infeasible for an attacker, or it would slow them down enough, to consider such a key secure.<\/p>\n\n\n\n<p> In this teaching aide we will talk about one of such key derivation functions, PBKDF2. We will cover its history, algorithm of work, use cases. We will also discuss its advantages and disadvantages, as well as some of its alternatives.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/ISEC-601-Teaching-Aide-Slides-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of ISEC- 601 Teaching Aide Slides.\"><\/object><a id=\"wp-block-file--media-7d263ca1-e253-4f36-8744-0fb34f7bd493\" href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/ISEC-601-Teaching-Aide-Slides-1.pdf\">ISEC- 601 Teaching Aide Slides<\/a><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/ISEC-601-Teaching-Aide-Slides-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7d263ca1-e253-4f36-8744-0fb34f7bd493\">Download<\/a><\/div>\n\n\n\n<p>Now that we are familiar with PBKDF2, it is a good idea to check the knowledge and understanding of the topic with a simple quiz-game that can be accessed via the link below.<\/p>\n\n\n\n<p><a href=\"https:\/\/pbkdf-2-project.vercel.app\">https:\/\/pbkdf-2-project.vercel.app<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>GitHub link to the website code: https:\/\/github.com\/Benedict-Kpaduwa\/PBKDF2-Project\/ Storing and transmitting information securely, as well as ensuring its integrity, authenticity, and confidentiality are some of the most important problems faced within a field of cryptography. There are all kinds of encrypting, hashing and signing algorithms, all relying on some secret password. One of the biggest problems &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2025\/10\/01\/pbkdf2-history-usage-and-future-teaching-aide\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;PBKDF2 &#8211; History, Usage, and Future &#8211; Teaching Aide&#8221;<\/span><\/a><\/p>\n","protected":false},"author":726,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[28,59],"class_list":["post-2019","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-isec601","tag-isec601-teaching-aide","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Lev Chistyakov","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/lev-chistyakov\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/2019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/726"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=2019"}],"version-history":[{"count":4,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/2019\/revisions"}],"predecessor-version":[{"id":2033,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/2019\/revisions\/2033"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=2019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=2019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=2019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}