I'm working on a encryption functionality based on classes inherited from SymmetricAlgorithm such as TripleDes, DES, etc.
Basically there're two options to generate consistent key and IV for my algorithm class, PasswordDeriveBytes
and Rfc2898DeriveBytes
, both inherit from DeriveBytes abstract class.
The PasswordDeriveBytes.GetBytes()
method is marked as obsolete in .NET framework while Rfc2898DeriveBytes.GetBytes() is recommended, as it matches the PBKDF2 standard. However, based on my testing, calling the same GetBytes()
method in Rfc2898DeriveBytes class is almost 15 times slower than that in PasswordDeriveBytes
class, which leads to unexpected CPU usage (always higher than 50%).
Here're some testing data:
Based on the testing, the bad performance of Rfc2898DeriveBytes
is not acceptable in production environment.
Has anyone noticed this problem before? Any solution I can still use a standard one without hitting the performance? Any risk to use an obsolete method (could be removed in future version)?
Thanks guys!
Edit:
Probably I found where the problem is... The default iteration count number for PasswordDeriveBytes
is 100, while for Rfc2898DeriveBytes
is 1000. After I changed them to the same number as 1000, executing Rfc2898DeriveBytes
is only double time.
They aren't the same thing.
Rfc2898DeriveBytes is an implementation of PBKDF2. PasswordDeriveBytes is an implementation of PBKDF1. PBKDF2 generates a different output, using a different method, and a much larger number of rounds than PBKDF1.
Password hashing functions, such as these, which are used for key derivation are supposed to be slow. That's the point - it makes them much more difficult to crack.
The two functions are not compatible, and PasswordDeriveBytes is not nearly as secure.
I think you are missing the point of derivebytes. It is supposed to be slow. It intentionally uses slow algorithm which cannot be sped up by clever trick. The typical "number of iterations" parameter should be in 2^16-2^20 range and introduce a 0.1-0.5 second delay between user entering password and the key is generated. The intention is to defend against weak passwords selected by "lazy ignorant users" and slow down brute force search.
This blogpost talks about the differences between the two: http://blogs.msdn.com/shawnfa/archive/2004/04/14/generating-a-key-from-a-password.aspx
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With