Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> the 100,000 PBKDF2 iterations on the server side are only applied to the master password hash, not to the encryption key

So only the password hash itself gets the extra iterations. The diagram and the text of the whitepaper seem to be at odds, though. The diagram doesn't show extra iterations for the encryption key, but the whitepaper says:

> PBKDF-SHA256 is used to derive the encryption key from your Master Password. Then this key is salted and hashed for authenticating with the Bitwarden servers. The default iteration count used with PBKDF2 is 100,001 iterations on the client (this client-side iteration count is configurable from your account settings), and then an additional 100,000 iterations when stored on our servers (for a total of 200,001 iterations by default).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: