+ (NSData *)encryptData:(NSData *)thePlaintext withSettings:(RNCryptorSettings)theSettings password:(NSString *)aPassword error:(NSError **)anError
Given users tend to use weak passwords like 4 digit pins, would that be strong enough? Or could we add some extra level of security by using a second password* as salt?
If this is the case, as far as I know, we could use
+ (NSData *)encryptData:(NSData *)thePlaintext withSettings:(RNCryptorSettings)theSettings encryptionKey:(NSData *)anEncryptionKey HMACKey:(NSData *)anHMACKey error:(NSError **)anError
where encryption key is created with session password and second password - right? But then HMACKey would be nil. If we'd use our hmac as HMACKey and create the encryption key from plain password via
+ (NSData *)keyForPassword:(NSString *)password salt:(NSData *)salt settings:(RNCryptorKeyDerivationSettings)keySettings;
what should we use as salt if not the second password?
Phew, sorry, but I got really lost on the track, trying to get used to all the crypto stuff
* second password could be dynamically created from usernames or ids of both master and slave
--
You received this message because you are subscribed to the Google Groups "rncryptor" group.
To unsubscribe from this group and stop receiving emails from it, send an email to rncryptor+...@googlegroups.com.
Visit this group at https://groups.google.com/group/rncryptor.
For more options, visit https://groups.google.com/d/optout.