(Tcl) PBKDF2 - Derive Key from Password
Demonstrates how to derive a symmetric encryption key from a password using PBKDF2. For more information, see https://www.chilkatsoft.com/key_derivation_pbkdf2.asp
load ./chilkat.dll
# This example assumes the Chilkat API to have been previously unlocked.
# See Global Unlock Sample for sample code.
set crypt [new_CkCrypt2]
set pw "password"
set pwCharset "utf-8"
# Such as sha256, sha512
set hashAlg "sha256"
# 16 bytes
set saltHex "78578E5A5D63CB0668AB39B21C8637FA"
set iterationCount 100000
# Derive a 256-bit key from the password.
set outputBitLen 256
# The derived key is returned as a hex or base64 encoded string.
# (Note: The salt argument must be a string that also uses
# the same encoding.)
set enc "hex"
set hexKey [CkCrypt2_pbkdf2 $crypt $pw $pwCharset $hashAlg $saltHex $iterationCount $outputBitLen $enc]
puts "$hexKey"
# Sample output:
# AE96E261E32792D0FD6F0E72F8E872D046F7DB4C1FA7C83892EC73C49F461B70
delete_CkCrypt2 $crypt
|