{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:36:48Z","timestamp":1773329808316,"version":"3.50.1"},"reference-count":26,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Traditional key derivation techniques, including the widely adopted PBKDF2, operate with static parameters that do not account for contextual factors such as device capabilities, data sensitivity, or password strength. In this paper, we propose a novel adaptive PBKDF2-based encryption scheme that adjusts its iteration count dynamically based on computational resource index (CRI), data risk level (DRL), and password strength assessment. We present the theoretical model, algorithmic design, and empirical validation of our approach through nine comprehensive experiments, covering performance, scalability, brute-force resistance, entropy quality, and cross-platform consistency. Our results confirm that the adaptive method achieves a secure balance between computational cost and cryptographic strength, outperforming static PBKDF2 in dynamic scenarios. Our framework enhances cryptographic resilience in real-world deployments and offers a forward-compatible foundation for adaptive security solutions.<\/jats:p>","DOI":"10.3390\/cryptography9020039","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T05:49:22Z","timestamp":1749102562000},"page":"39","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Key Derivation: A Dynamic PBKDF2 Model for Modern Cryptographic Systems"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8225-4180","authenticated-orcid":false,"given":"Ali Abdullah S.","family":"AlQahtani","sequence":"first","affiliation":[{"name":"Department of Software Engineering (Cybersecurity Track), College of Computer & Information Science, Prince Sultan University, Riyadh 11586, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Chahar, S. (2025). Exploring the future trends of cryptography. Next Generation Mechanisms for Data Encryption, CRC Press.","DOI":"10.1201\/9781003508632-16"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Sharma, A., Thapliyal, S., Wazid, M., Mishra, A.K., Kumar, P., and Giri, D. (2024, January 28\u201329). A Secure Mechanism for Password Hash Value Generator with the Security Analysis of Various Hashing Algorithms. Proceedings of the 2024 4th International Conference on Computer, Communication, Control & Information Technology (C3IT), Hooghly, India.","DOI":"10.1109\/C3IT60531.2024.10829444"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ibrahim, D., Ahmed, K., Abdallah, M., and Ali, A.A. (2022). A new chaotic-based RGB image encryption technique using a nonlinear rotational 16\u00d7 16 DNA playfair matrix. Cryptography, 6.","DOI":"10.3390\/cryptography6020028"},{"key":"ref_4","unstructured":"Ertaul, L., Kaur, M., and Gudise, V.A.K.R. (2016, January 25\u201328). Implementation and performance analysis of pbkdf2, bcrypt, scrypt algorithms. Proceedings of the International Conference on Wireless Networks (ICWN), London, UK."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Limniotis, K. (2021). Cryptography as the means to protect fundamental human rights. Cryptography, 5.","DOI":"10.3390\/cryptography5040034"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ariffin, A.L.B.A.K., and Vasuthevan, K. (2024, January 7). The Development of Hybrid Technique for Encryption Application. Proceedings of the 2024 IEEE 12th Conference on Systems, Process & Control (ICSPC), Malacca, Malaysia.","DOI":"10.1109\/ICSPC63060.2024.10861952"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Kumar, P.R., and Goel, S. (2025). A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-92245-9"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2548","DOI":"10.1007\/s11227-019-03021-2","article-title":"A context-aware encryption protocol suite for edge computing-based IoT devices","volume":"76","author":"Dar","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Premakumari, S.B.N., Sundaram, G., Rivera, M., Wheeler, P., and Guzm\u00e1n, R.E.P. (2025). Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks. Sensors, 25.","DOI":"10.3390\/s25072056"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Fang, X., Zheng, L., Fang, X., Chen, W., Fang, K., Yin, L., and Zhu, H. (2024). Pioneering advanced security solutions for reinforcement learning-based adaptive key rotation in Zigbee networks. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-64895-8"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"112","DOI":"10.3390\/iot4020007","article-title":"Secure adaptive context-aware ABE for smart environments","volume":"4","author":"Inshi","year":"2023","journal-title":"IoT"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"102612","DOI":"10.1016\/j.cose.2022.102612","article-title":"A model for risk-based adaptive security controls","volume":"115","author":"Calvo","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Kun, L., Kuang, P., and Yang, F. (2022, January 18\u201320). Adaptive Change Technology of Encryption Strength Driven by Network Attack Threat. Proceedings of the 2022 International Conference on Cyber Security, New York, NY, USA.","DOI":"10.1145\/3584714.3589125"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Abie, H., and Balasingham, I. (2012, January 24\u201326). Risk-based adaptive security for smart IoT in eHealth. Proceedings of the 7th International Conference on Body Area Networks, Oslo, Norway.","DOI":"10.4108\/icst.bodynets.2012.250235"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C.M., Zeldovich, N., and Balakrishnan, H. (2011, January 23\u201326). CryptDB: Protecting confidentiality with encrypted query processing. Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, Cascais, Portugal.","DOI":"10.1145\/2043556.2043566"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Yogaraja, C., Sankarasubramanian, R., Geetha, M., and Keerthanadevi, R. (2025). Cryptography in IoT Using Elliptic Curve Cryptography with Adaptive Hunter-Prey Optimization. IETE J. Res., 1\u201315.","DOI":"10.1080\/03772063.2025.2459791"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Dinu, D., and Khovratovich, D. (2016, January 21\u201324). Argon2: New generation of memory-hard functions for password hashing and other applications. Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbr\u00fccken, Germany.","DOI":"10.1109\/EuroSP.2016.31"},{"key":"ref_18","unstructured":"Percival, C. (2025, June 02). Stronger Key Derivation via Sequential Memory-Hard Functions. Available online: https:\/\/www.tarsnap.com\/scrypt\/scrypt.pdf."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Boneh, D., Corrigan-Gibbs, H., and Schechter, S. (2016, January 4\u20138). Balloon hashing: A memory-hard function providing provable protection against sequential attacks. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam.","DOI":"10.1007\/978-3-662-53887-6_8"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Hatzivasilis, G. (2017). Password-hashing status. Cryptography, 1.","DOI":"10.3390\/cryptography1020010"},{"key":"ref_21","first-page":"296","article-title":"Examining PBKDF2 security margin\u2014Case study of LUKS","volume":"46","author":"Visconti","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"105134","DOI":"10.1016\/j.ic.2023.105134","article-title":"Cost-asymmetric memory hard password hashing","volume":"297","author":"Bai","year":"2024","journal-title":"Inf. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Eum, S., Kim, H., Song, M., and Seo, H. (2023). Optimized Implementation of Argon2 Utilizing the Graphics Processing Unit. Appl. Sci., 13.","DOI":"10.3390\/app13169295"},{"key":"ref_24","unstructured":"Provos, N., and Mazieres, D. (1999, January 6\u201311). A future-adaptable password scheme. Proceedings of the USENIX Annual Technical Conference, Monterey, CA, USA."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3096","DOI":"10.1109\/TC.2016.2516011","article-title":"Lyra2: Efficient password hashing with high security against time-memory trade-offs","volume":"65","author":"Andrade","year":"2016","journal-title":"IEEE Trans. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Blocki, J., Harsha, B., Kang, S., Lee, S., Xing, L., and Zhou, S. (2019, January 18\u201322). Data-independent memory hard functions: New attacks and stronger constructions. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-030-26951-7_20"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/2\/39\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:46:59Z","timestamp":1760032019000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/2\/39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,5]]},"references-count":26,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["cryptography9020039"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9020039","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,5]]}}}