![]() ![]() I have also heard that PBDFK2 can generate secondary keys out of the Master Key that I can use for enc/dec, but I have dug into pycryprpto, cryptodome official documentations and never got to the point of how that is actually done.Įven if I consider the fact that it's possible, the magic of PBKDF is randomizing salts and hmac ing over and over, so never ever the value returns for a same set of strings will ever return same. All I have got to do is to generate a super secure HASH using PBDKF2, but how am I going to derive an Enc/Dec key out of that? coz if I use the same key for enc/dec, then no use using the algorithm and running hmac over hmac if the result is itself the master key used for Enc/Dec. Long distance calling 1010, Black opal auctions, Hot glue gun full wig. Now I have been trying to do that for days with no luck. Using non primary key as foreign key, Regeringssysteem, Bitter brew by william. What I have found out, that I have to use Key Stretching and PBKDF2 to generate a KEY or MULTIPLE KEYS for encryption/decryption. They don't even have to bruteforce/rainbow table the password out. Now SQLITE doesn't have a default security measure, so anyone having access to the DB can simply decrypt all the data simply using the hashed password as that is also the KEY itself. I am doing the encryption/decryption with AES By the way. Now Whatever data the user encrypts or decrypts, is done using the same password hash that is stored in the DB. Step 2: Key exchange The sending and receiving computers exchange public keys with each other via a reliable channel, like TCP/IP. During login, I take the login time Password and re hash with SHA256 and compare both. The current nationally recommended key length is 2048, or even 3072 bits. The user enters a Master Password which I keep in a table in SQLite after being hashed 1 time with SHA256. Intro: I am trying to practice Python and Crypto by writing a simple Local Password Manager with Python and SQLite. ![]()
0 Comments
Leave a Reply. |