On Tue, May 10, 2005, Sean Covel wrote:

> Steve,
> 
> > 
> >>Additionally you seem to be using an unsalted key derivation algorithm with 
> >>a
> >>stream cipher (RC4). If passwords are reused then I hope you aren't sending
> >>anything sensitive that way because that is an insecure combination.
> >>
> > 
> 
> Additional Questions:
> 
> SALT isn't secret, correct?  In this app I'm going to have to send the
> SALT to the other end in order for the passwords to be the same...This
> isn't a problem, is it?
> 

Salt shouldn't be predictable so using a fixed string isn't an option but it
isn't secret.

> IV.  I should really use an IV with some modes.  Again, its random
> bytes, but it doesn't have to be secret.  I will also have to transmit
> the IV to the other side.  That's not a security problem is it?
> 
> Is is a problem if you use the same random bytes for the SALT and the IV?
> 

EVP_BytesToKey() also generates an IV so that isn't a problem.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to