Serious Security: MD5 considered harmful – to the tune of $600,000
It’s not just the hashing, by the way. It’s the salting and the stretching, too! Continue reading Serious Security: MD5 considered harmful – to the tune of $600,000
Collaborate Disseminate
It’s not just the hashing, by the way. It’s the salting and the stretching, too! Continue reading Serious Security: MD5 considered harmful – to the tune of $600,000
I am trying to better understand the processes involved in e2ee using WebCrypto on the browser.
I understand that the only real method to use a passphrase to generate a symmetric key on the browser is using PBKDF2 using a crypto random sal… Continue reading Can parts of WebCrypto AES-GCM be reused between encryptions
I’m implementing encryption in one of my webextension which will encrypt locally stored data.
I have a single master CryptoKey (AES-GCM) that encrypts everything.
And this master key is then encrypted (using crypto.subtle.wrapKey) with:
u… Continue reading How long "digits-only recovery code" is secure enough?
From the manual of cryptsetup:
Passphrase processing: Whenever a passphrase is added to a LUKS header
(luksAddKey, luksFormat), the user may specify how much the time the
passphrase processing should consume. The time is used to determ… Continue reading LUKS: longer passphrase iteration count
I want to hash email addresses so that they are anonymous but still unique in my database. I was thinking of using scrypt for this and creating the salt as a sha256 of some secret stored on the server + their email address. Implementation … Continue reading Hashing email addresses using scrypt
I know that PBKDF2 hashes the password a number of times, the result being a key. Can an attacker find the key if they don’t know the password, but know the value of the hash of the password?
Continue reading Can you break PBKDF2 if you know the hash of the password? [migrated]
Backing up your password manager is a good idea in case your house burns down, but where do you store the password to the off-site backup?
Remembering the master password is easy, but re-using the master password directly for my off-site b… Continue reading Key derivation for password manager backup?
First of all, I don’t want to reinvent the wheel, just want to build my own car. Non-product environment; only for fun and entertainment.
The goal is to use a single private (and never published) master password to create unique passwords … Continue reading DIY: password key derivation tool using PBKDF2 / HMAC [migrated]
I was reading the BitWarden Security Whitepaper (BitWarden is an open source, zero-knowledge password manager that performs encryption/decryption on the client side) and came across the following statement:
A Master Password hash is also … Continue reading Security implications of using a plaintext master password as the salt for PBKDF2 in a zero-knowledge system
I’m designing a password vault that’s accessible to clients through an existing web application. The clients are small, (and mostly non-technical) businesses that aren’t using password managers, but are using this existing application that… Continue reading Design of a web based password vault