Skip to content

Latest commit

 

History

History
14 lines (11 loc) · 607 Bytes

README.md

File metadata and controls

14 lines (11 loc) · 607 Bytes

WIP, DO NOT USE

The goal here is to extend bcrypt to wrap a 256-bit secret using a key derived from the salt and password, in minimal additional time, without opening up any cracking shortcuts.

Current approach is to hash the final eksblowfish internal state with BLAKE2b and use the result as a key for ChaCha20-Poly1305. Thanks to Sc00bz for the suggestion to use blake2b(S[]) as the key.

The motivating use case is to provide an key for use with Dovecot’s mail crypt plugin.