Skip to content

Key Derivation (PBKDF2)

TorrinPass uses PBKDF2 (Password-Based Key Derivation Function 2) to transform your master password into a secure encryption key.

Your master password might be “MyDog2024!” — memorable but not directly usable as an encryption key. PBKDF2:

  1. Stretches your password into a 256-bit key
  2. Slows down brute-force attacks
  3. Adds salt to prevent rainbow table attacks

ParameterValue
AlgorithmPBKDF2-HMAC-SHA256
Iterations210,000
Output256-bit key
Salt32 bytes, unique per user

More iterations = slower key derivation = harder to brute-force.

Password ManagerIterations
TorrinPass210,000
1Password100,000
LastPass100,100
Bitwarden100,000
OWASP Recommendation210,000

We follow OWASP’s 2023 recommendation for PBKDF2-SHA256.


Master Password: "MyDog2024!"
+
Salt: [32 random bytes, unique to you]
PBKDF2-HMAC-SHA256 (210,000 iterations)
256-bit Master Encryption Key (MEK)

With 210,000 iterations, an attacker trying to guess your password faces:

  • 1 guess takes ~0.2 seconds on a modern CPU
  • 1 million guesses takes ~2.3 days
  • 1 billion guesses takes ~6.3 years

And that’s per password attempt. A strong master password makes this effectively impossible.


Each user has a unique 32-byte salt. This means:

  • Pre-computed password tables are useless
  • Each user’s key derivation is unique
  • Same password → different keys for different users