I use PBKDF2 with SHA-256 to store hashes of passwords. I use the following parameters:
number of iterations desired = 1024
length of the salt in bytes = 16
length of the derived key in bytes = 4096
But recently I found out that most probably the parameters are badly selected.
For example wiki page says:
standard was written in 2000, the recommended minimum number of iterations was 1000 .... As of 2005 a Kerberos standard recommended 4096 iterations
which means that most probably I have to increase this number
and
The standard recommends a salt length of at least 64 bits
Which means that my salt length is ok is too low (thanks to Neil Smithline). But when searching through the standard I was not able to find the mention about recommended salt length.
When I looked for the length of the derived key and found this nice answer:
If you use PBKDF2 for password hashing, then 12 bytes of output ought to be fine, with a non-negligible security margin
it suggested me that I took too big number which probably does not make sense.
So my question is: can anyone show good parameters (may be with some justifications/links) for this scenario of password hashing (as of 2016). Also can I guarantee that the derived key length will be always the same length as I ask?