(Go) PBKDF2 - Derive Key from Password
Demonstrates how to derive a symmetric encryption key from a password using PBKDF2. For more information, see https://www.chilkatsoft.com/key_derivation_pbkdf2.asp
// This example assumes the Chilkat API to have been previously unlocked.
// See Global Unlock Sample for sample code.
crypt := Crypt2_Ref.html">chilkat.NewCrypt2()
pw := "password"
pwCharset := "utf-8"
// Such as sha256, sha512
hashAlg := "sha256"
// 16 bytes
saltHex := "78578E5A5D63CB0668AB39B21C8637FA"
iterationCount := 100000
// Derive a 256-bit key from the password.
outputBitLen := 256
// The derived key is returned as a hex or base64 encoded string.
// (Note: The salt argument must be a string that also uses
// the same encoding.)
enc := "hex"
hexKey := crypt.Pbkdf2(pw,pwCharset,hashAlg,saltHex,iterationCount,outputBitLen,enc)
fmt.Println(*hexKey)
// Sample output:
// AE96E261E32792D0FD6F0E72F8E872D046F7DB4C1FA7C83892EC73C49F461B70
crypt.DisposeCrypt2()
|