(Classic ASP) PBKDF2 - Derive Key from Password
Demonstrates how to derive a symmetric encryption key from a password using PBKDF2. For more information, see https://www.chilkatsoft.com/key_derivation_pbkdf2.asp
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head>
<body>
<%
' This example assumes the Chilkat API to have been previously unlocked.
' See Global Unlock Sample for sample code.
set crypt = Server.CreateObject("Chilkat.Crypt2")
pw = "password"
pwCharset = "utf-8"
' Such as sha256, sha512
hashAlg = "sha256"
' 16 bytes
saltHex = "78578E5A5D63CB0668AB39B21C8637FA"
iterationCount = 100000
' Derive a 256-bit key from the password.
outputBitLen = 256
' The derived key is returned as a hex or base64 encoded string.
' (Note: The salt argument must be a string that also uses
' the same encoding.)
enc = "hex"
hexKey = crypt.Pbkdf2(pw,pwCharset,hashAlg,saltHex,iterationCount,outputBitLen,enc)
Response.Write "<pre>" & Server.HTMLEncode( hexKey) & "</pre>"
' Sample output:
' AE96E261E32792D0FD6F0E72F8E872D046F7DB4C1FA7C83892EC73C49F461B70
%>
</body>
</html>
|