-
Notifications
You must be signed in to change notification settings - Fork 109
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A call for AEAD #280
Comments
Yes, we use AES-256-CCM Also if it's about performance, you should be thankful we use an slow algorythm as it takes longer to bruteforce! So, as we don't currently have time to make such a huge change, i don't think we will think on changing the clientside encryption algorithm. |
What @animalillo said. Also the browser extension has to be updated. You're welcome to fork passman and make a PR. |
I agree on all parts except this:
I think at some time you'll have to do that anyway. You can't really claim you can/should use the current encryption algorithm in 10 or 20 years. It likely is not broken, but better ones are available… |
For client-side encryption you use CCM, which is used in JSCL.
This is authenticated encryption (AEADS). GCM may just be more performant and you may switch (it's just one parameter in JSCL), but AFAIK it is not insecure.
According to your description you are using CBC with HMAC in a way that seems to be okay, but you should use authenticated encryption. Again e.g. GCM. It makes it much easier…
And simplicity is always good when it comes to using crypto.
E.g. OwnCloud had problems when they did not use AEADs…
Okay, no AEADs in older PHP versions, but you could e.g. use Libsodium or so…
At least when it is available.
The text was updated successfully, but these errors were encountered: