Created
March 22, 2016 21:19
-
-
Save Sommerregen/f01bbec5785ff30512f3 to your computer and use it in GitHub Desktop.
PBKDF2 (Password-Based Key Derivation Function) is a key stretching algorithm. It can be used to hash passwords in a computationally intensive manner, so that dictionary and brute-force attacks are less effective. See CrackStation's Hashing Security Article for instructions on implementing salted password hashing. See https://defuse.ca/php-pbkdf…
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/* | |
* PBKDF2 key derivation function as defined by RSA's PKCS #5: https://www.ietf.org/rfc/rfc2898.txt | |
* $algorithm - The hash algorithm to use. Recommended: SHA256 | |
* $password - The password. | |
* $salt - A salt that is unique to the password. | |
* $count - Iteration count. Higher is better, but slower. Recommended: At least 1000. | |
* $key_length - The length of the derived key in bytes. | |
* $raw_output - If true, the key is returned in raw binary format. Hex encoded otherwise. | |
* Returns: A $key_length-byte key derived from the password and salt. | |
* | |
* Test vectors can be found here: https://www.ietf.org/rfc/rfc6070.txt | |
* | |
* This implementation of PBKDF2 was originally created by https://defuse.ca | |
* With improvements by http://www.variations-of-shadow.com | |
*/ | |
function pbkdf2($algorithm, $password, $salt, $count, $key_length, $raw_output = false) | |
{ | |
$algorithm = strtolower($algorithm); | |
if(!in_array($algorithm, hash_algos(), true)) | |
trigger_error('PBKDF2 ERROR: Invalid hash algorithm.', E_USER_ERROR); | |
if($count <= 0 || $key_length <= 0) | |
trigger_error('PBKDF2 ERROR: Invalid parameters.', E_USER_ERROR); | |
if (function_exists("hash_pbkdf2")) { | |
// The output length is in NIBBLES (4-bits) if $raw_output is false! | |
if (!$raw_output) { | |
$key_length = $key_length * 2; | |
} | |
return hash_pbkdf2($algorithm, $password, $salt, $count, $key_length, $raw_output); | |
} | |
$hash_length = strlen(hash($algorithm, "", true)); | |
$block_count = ceil($key_length / $hash_length); | |
$output = ""; | |
for($i = 1; $i <= $block_count; $i++) { | |
// $i encoded as 4 bytes, big endian. | |
$last = $salt . pack("N", $i); | |
// first iteration | |
$last = $xorsum = hash_hmac($algorithm, $last, $password, true); | |
// perform the other $count - 1 iterations | |
for ($j = 1; $j < $count; $j++) { | |
$xorsum ^= ($last = hash_hmac($algorithm, $last, $password, true)); | |
} | |
$output .= $xorsum; | |
} | |
if($raw_output) | |
return substr($output, 0, $key_length); | |
else | |
return bin2hex(substr($output, 0, $key_length)); | |
} | |
?> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment