Try OpenEdge Now
skip to main content
Core Business Services - Security and Auditing
Security : Cryptography : Password-based encryption (PBE) : PBE algorithms
 
PBE algorithms
PBE is typically implemented using standard hashing algorithms, such as the PKCS#5 standard of RFC2898. These algorithms often use a built-in key to encrypt a password and might also allow the addition of an auxiliary key (a PBE salt) to strengthen the encryption.