Hashing algorithm needed
James A. Donald
jamesd at echeque.com
Thu Sep 9 05:08:47 EDT 2010
On 2010-09-09 6:35 AM, Ben Laurie wrote:
> What I do in Nigori for this is use DSA. Your private key, x, is the
> hash of the login info. The server has g^x, from which it cannot
> recover x,
Except, of course, by dictionary attack, hence g^x, being low
entropy, is treated as a shared secret.
and the client does DSA using x.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list