Simple encryption software - Security & Cryptography
Users browsing this thread: 5 Guest(s)
|
|||
(05-04-2019, 09:00 AM)z3bra Wrote: I know that there are multiple security implications with it, but I'm no security expert, so I would like your input/advice on this topic. A good idea is to use block chains that will have a MAC that chains up after each passwords and maybe could be used as the next IV. Also, why not take into account checksums in your password DB, making sure everything hasn't been tampered with. |
|||