Hi, when using a PBKDF you could store a high-entropy salt in the backup
as well. It would be fed into the key derivation function to frustrate
rainbow-table attacks (that was probably the idea of having the iv there
as well, right?).
For using the encrypted backup as a means to enable simple
username/password login, maybe some ideas of this paper by some
colleagues of mine and me could be interesting: "Passwords in
Peer-to-Peer"
http://www.csc.kth.se/~gkreitz/p2ppass/
To effectively defend against offline bruteforce attacks (which, I
guess, would become quite attractive if many people store their
encrypted credentials in the DHT) something like this might be
interesting: "Memento: How to Reconstruct Your Secrets from a Single
Password in a Hostile Environment" by Camenish et al.
https://eprint.iacr.org/2014/429.pdf
Probably all their zero-knowledge-proofs are too heavy-weight to
implement on DHT nodes, but they refer to related password-hardening
protocols that might be easier to implement. The basic idea is that you
need to contact several nodes that help to transform your password into
a secret key (without them learning either) and after you did so, you
prove to all these nodes that you successfully logged in. If these nodes
get too many requests without corresponding proofs that the requester
succeeded in logging in, they rate-limit the requests to frustrate
brute-force attacks.
Cheers, Benny
> <mailto:
twister-dev%2Bunsu...@googlegroups.com>.
> <mailto:
twist...@googlegroups.com>.
> --
> You received this message because you are subscribed to the Google
> Groups "twister-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to
twister-dev...@googlegroups.com
> <mailto:
twister-dev...@googlegroups.com>.
> <mailto:
twist...@googlegroups.com>.
--
Please encrypt.
PGP: 0xB66E7E91