Skip to content

Conversation

finvu
Copy link

@finvu finvu commented Sep 22, 2021

The current web redirection implementation performs key derivation every time encryption/decryption is performed and is very slow not scalable. This is due to the high iteration count of 65k during key derivation. Key derivation is required for weak human readable passwords. However if strong random password with high entropy is used, then there is no need to perform key derivation every time. The Java sample in this pull request also has a method for generating random 32 byte passwords which can be used for generating and sharing passwords between AA and FIU.

This performance issue was also discussed in stack exchange and can be found below. The sample implementation is based on the suggestions made in this post:

https://security.stackexchange.com/questions/254422/use-pre-computed-pbkdf2-key-with-high-iteration-count-as-password

We may need to allow co-existence of this new method and old one, hence it is better to create a separate branch of the current version or tag it.

@sahayak-bot sahayak-bot added documentation Improvements or additions to documentation enhancement New feature or request labels Sep 22, 2021
dheerajkhardwal pushed a commit that referenced this pull request Dec 3, 2021
Update response specification for LSP usecase
gitbook-com bot pushed a commit that referenced this pull request Dec 3, 2021
gitbook-com bot pushed a commit that referenced this pull request Nov 25, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants