I. Introduction
Commonly used and popular symmetric key encryption scheme, AES-128 requires a random key of 128 bits. There are many AES-based applications in which users typically provide a password rather than a 128 bit random key. Due to low entropy and poor randomness, such passwords can not be considered adequately secure [3] [5]. Moreover, passwords are generally selected from a relatively small character set that can lead to a dictionary attack [5] [15] [6]. To avoid this, family of Password-based Key Derivation Functions (PBKDFs) was introduced in RFC 8018 [14].