On 5/14/15 2:29 PM, Jeffrey Walton wrote:
> Just bike shedding, but I don't think that's fair to WebCrypto.
> WebCrypto provides a standard set of primitives, like hahses. But the
> selected hashes are designed to be fast, and not slow or memory hard.
> 
> So comparing a WebCrypto PBKDF based on SHA-X is akin to comparing
> apples and oranges.

I agree, i understand, but my point is as that given a specific
constraint (ie: waiting 10s for number crunching in a browser with some
JS code to do key-stretching) what's best?

a) an entirely non-native javascript based scrypt for 10s
b) design something new re-using existing fast
native-webcrypto-primitives with some non-native javascript code running
for the same 10s achieve a better security strength improvement ?

For example, can we achieve an scrypt-like approach re-using for the
most computational intensive operations the existing
native-crypto-primitives available from webcrypto?


> 
> Also see 
> https://lists.w3.org/Archives/Public/public-webapps/2015JanMar/0706.html.
Lovely, but that sounds like to be a long path. I will subscribe to the
mailing list and support it!

Fabio
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to