úÎ 8   Safe-Inferred+%A reasonable default for rsa pbkdf2.  'pbkdf2 = pbkdf2' (prfSHA512,64) 5000 64ÛSHA512 outputs 64 bytes. At least 1000 iters is suggested by PKCS#5 (rsa link above). I chose 5000 because this takes my computer a little over a second to compute a simple key derivation (see t test function in source)hDklen of 64 seemed reasonable to me: if this is being stored in a database, doesn't take too much space.BComputational barriers can be raised by increasing number of iters6Password Based Key Derivation Function, from RSA labs. <pbkdf2' (prf,hlen) cIters dklen (Password pass) (Salt salt) prf: pseudo random functionhlen: length of prf output#cIters: Number of iterations of prf2dklen: Length of the derived key (hashed password)            PBKDF2-0.3.1.5 Crypto.PBKDF2 HashedPassSaltPasswordpbkdf2pbkdf2'toOctets fromOctetstintToFourWord8smyxormyor prfSHA512t2