← Back

Key Derivation Functions

Transforming passwords into cryptographic keys

PBKDF2

2000
Iterative hashing with salt. CPU-bound. NIST approved.

bcrypt

1999
Blowfish-based. Memory-hard variant. Popular for passwords.

Argon2

2015
PHC winner. Memory + CPU hard. Best modern choice.
⚠️ This demo uses PBKDF2 via Web Crypto API. For production password hashing, use Argon2id with appropriate parameters.

Derived Key

Click "Derive Key" to generate
Derivation Time: -
Password Strength:
Enter a password to check strength

Why KDFs Matter

Problem: Passwords are low-entropy (easily guessable). Directly hashing them is vulnerable to:

Rainbow tables: Precomputed hash lookups

Brute force: Modern GPUs can compute billions of hashes/second

Solution: KDFs add:

Salt: Random value makes each hash unique, defeating rainbow tables

Iterations: Slows down computation, making brute force expensive

Memory hardness: (Argon2) Requires RAM, limiting parallel GPU attacks