[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+aY-u7nThaA+KRcEzn5Z4ScK4gSBa92qs9PsN-iasAqFMe_yw@mail.gmail.com>
Date: Tue, 25 Mar 2014 19:02:12 +0000
From: Peter Maxwell <peter@...icient.co.uk>
To: "discussions@...sword-hashing.net" <discussions@...sword-hashing.net>
Subject: Re: [PHC] New password hashing entry: PolyPassHash
On 25 March 2014 17:38, Jim Manico <jim@...ico.net> wrote:
> > the password hashes, in my view, must themselves provide adequate
> security even when that secret key is compromised.
>
> If we cannot depend on proper key management for high-risk, scalable
> systems then all hope and all crypto is lost. Why are key-based solutions
> for password storage like HMACs (in specialized circumstances) so frowned
> upon by some of the crypto community, when key management is fundamental to
> so many other aspects of secure systems?
>
​Adequate key management and distribution is arguably the most challenging
problem in cryptography today, e.g. TLS relies on that very shoogly peg
that is certificate authorities, and we're still using passwords -
essentially low entropy fixed tokens - for most end users.
If you can solve the key management problem in a usable and scalable
manner, you're a better man than I :-)
Content of type "text/html" skipped
Powered by blists - more mailing lists