Does using subkeys provide better protection in this instance?
I was thinking of implementing the following scheme for encryption of many independent files:
From the password, which is given by the user, generate a master key using for example HMAC-SHA.
From this master key, a subkey is derived for e… Continue reading Does using subkeys provide better protection in this instance?