benfdc

Members
  • Posts

    1
  • Joined

  • Last visited

benfdc's Achievements

New User

New User (1/3)

  1. How is the encryption key derived from the secret? Are you using an appropriate key derivation function like pbkdf2, bcrypt, or scrypt, or are you (mis)using a common cryptographic hash? If you are using a password hash, which one, and how many iterations? More generally, is your encryption code documented somewhere?