lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 03 Sep 2014 17:37:27 -0400
From: Bill Cox <waywardgeek@...hershed.org>
To: discussions@...sword-hashing.net
Subject: Cryptographically strong salt is not overkill

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I just started poking into the Makwa code.  I'm still not sure if I'm
qualified to review it, but I can always comment on code.  I saw the
following comment:

    /*
     * A cryptographically strong PRNG is kinda overkill for a salt,
     * but it does not hurt to use one.
     */

This is not true!

If any salt generator that produces data that is distinguishable from
random data makes it into CipherShed, I will be pretty pissed off.
Don't forget that some users have a valid need to store the salt in
plain-text without letting an attacker know that it is in fact not
just random data.

This is a critical feature for both stenography and plausible
deniability.  Detectable salt would destroy the hidden volume feature
CipheShed inherits from TrueCrypt.

That said, I haven't reviewed the CipherShed code yet like I'm
reviewing this code...

Bill
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xf/3
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists