pbkdf2 - Add salt to pycrypto KDF - useful? -


i have noted sources indicate when using kdf pbkdf2 advocate injecting salt @ time of execution - this:

dv = salt + pbkdf2(salt + password, salt) 

versus "plain" usage of

dv = pbkdf2(password, salt) 

when using pycrypto.protocol.kdf pbkdf2 function (linked above), salt parameters add benefit if no 2 passwords have same salt (but salt stored password)?

presumably risk having oracle whereby identical passwords revealed as-such, encoded. case or there concern 1 ought mindful of?

if concern expect, in absence of fault in algorithms permits short-circuiting, plainly used salt obliges 1 recheck every password entire number of iterations. case?


Comments