You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hey, thanks for checking out my library. I don't think I understand what you mean, though.. what sort of attack is possible if the (blinded-then-unblinded) pw_scalar is related to the pw bytestring that gets hashed into the final transcript? In the Abdalla+Pointcheval paper, as far as I can tell, the password is used as both a scalar and a hash input, without any sort of KDF in between them. And in the PAKE2+ protocol (for which I'm looking at something Dan Boneh sent me a few years ago), the password is first split (by hashing) into two separate pieces, the first piece is used exactly as in (S)PAKE2 (both as a scalar and a hash input), and the second piece is only used as a scalar.
self.pw and self.pw_scalar are the "same". They need to be cryptographically different and not dependent on the other:
This is especially true for the client-server augmentation of SPAKE2, PAKE2+.
The text was updated successfully, but these errors were encountered: