Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-18 Thread takamichi saito
(2014/11/18 13:54), Bill Mills wrote: There will be no rainbow table for 256bits of search space. Suppose then that clientID has 256 possible values. How does salting with client ID do anything more than making the search space 264 bits? You keep saying that a salt is better than just adding

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-18 Thread takamichi saito
(2014/11/18 17:08), Nat Sakimura wrote: The code verifier is 256 bit high entropy cryptographic random. Let D:= {d | all possible 256 bit random}. This is the set of all possible code verifiers. Let S be SHA256 function. Then, set of all possible code challenge corresponding to D, which is den

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-18 Thread John Bradley
Yes SHA512 or even a left half SHA512 slows the attacker significantly over SHA256 as that alg has had a lot of ASIC optimization. I personally think that SHA256 for a short lived token is still good for a while. Sent from my iPhone > On Nov 18, 2014, at 11:33 AM, Bill Mills wrote: > >

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-18 Thread Bill Mills
In this case it ceaper to add bits than use soemthing like BCrypt. On Monday, November 17, 2014 9:33 PM, John Bradley wrote: I think where we are differing is that you think looking up a precomputed plain based on a indexed hash across some sort of media can be done faster than 3 Giga SHA256

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-18 Thread Nat Sakimura
The code verifier is 256 bit high entropy cryptographic random. Let D:= {d | all possible 256 bit random}. This is the set of all possible code verifiers. Let S be SHA256 function. Then, set of all possible code challenge corresponding to D, which is denoted by R, is defined as: S:D->R. Note that