You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It seems that newer ZKPPs than SRP, namely SPAKE2+, use modern crypto and are provably secure. Moreover, there is a pull request to add an implementation in the Stanford JS Crypto Library.
The goal is to have both:
not relying on the communication channel to the (auth) server being secure;
not storing information on the server that is sufficient to impersonate a user.
The text was updated successfully, but these errors were encountered:
@lrvick I'm tempted to simply modify AugPAKE to use an elliptic curve instead of a Z/nZ group.
This would trivially preserve the security proof, to boot.
(We lose pwh's current “post-quantumness”, but only for preventing people with the DB from impersonating clients; the passwords still get a pretty-much “Oh My God” security level)
On the other hand, homebaked crypto is not something I would relish recommending...
It seems that newer ZKPPs than SRP,
namely SPAKE2+,use modern crypto and are provably secure.Moreover, there is a pull request to add an implementation in the Stanford JS Crypto Library.The goal is to have both:
The text was updated successfully, but these errors were encountered: