You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently the AES key is SHA256 of the user entered password. To make it harder for an attacker who gets hold of an encrypted key file, SHA256 can be replaced by a strong KDF which also uses a salt.
This would make it significantly harder to brute force decryption of weaker passwords.
Currently the AES key is SHA256 of the user entered password. To make it harder for an attacker who gets hold of an encrypted key file, SHA256 can be replaced by a strong KDF which also uses a salt.
This would make it significantly harder to brute force decryption of weaker passwords.
Here is a example using scrypt and a cryptographically strong salt: https://github.com/ethereum/go-ethereum/blob/develop/crypto/key_store_passphrase.go#L117
The text was updated successfully, but these errors were encountered: