Hashing algorithm needed

James A. Donald jamesd at echeque.com
Thu Sep 9 05:08:47 EDT 2010


On 2010-09-09 6:35 AM, Ben Laurie wrote:
> What I do in Nigori for this is use DSA. Your private key, x, is the
> hash of the login info. The server has g^x, from which it cannot
> recover x,

Except, of course, by dictionary attack, hence g^x, being low
entropy, is treated as a shared secret.

and the client does DSA using x.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list