Explain, please, how with the same incoming password on the output, we get different keys?
I understand the basic crypto-primitives symmetric / asymmetric encryption, block / stream, hashing, mac / hmac, but not kdf :(
For example bcrypt. How he does it? Ok, so how can you understand, we just interfere with the salt and get different values, but how does it then validate that this password is valid for this key, if the salt was random?