Red Squirrel
No Lifer
I'm working on redesigning my password manager as it was quickly thrown together a while back with intention of making it better. Right now the password to get in *IS* the encryption key, which is not exactly ideal. So now I'm making it better.
So I will make it so there are one or multiple keys that are proper 256 bit binary random strings. Will be using AES-256. (open to other suggestions did not really pick that one for any particular reason, just had to pick something)
Now the keys obviously have to be encrypted or otherwise stored in a secure fashion. I'm thinking of just encrypting them with my password, and when I change my password then it just needs to reencrypt the keys. Right now it would need to reencrypt all the passwords. But this kinda brings me back to square one, if someone gets ahold of the database they just need to brute force the password to get the key and then use it to get the data.
How is this normally done? Ex: how are keys secured so that only authenticated users can use them?
This is a web based application using php. It would be running on my local network.
So I will make it so there are one or multiple keys that are proper 256 bit binary random strings. Will be using AES-256. (open to other suggestions did not really pick that one for any particular reason, just had to pick something)
Now the keys obviously have to be encrypted or otherwise stored in a secure fashion. I'm thinking of just encrypting them with my password, and when I change my password then it just needs to reencrypt the keys. Right now it would need to reencrypt all the passwords. But this kinda brings me back to square one, if someone gets ahold of the database they just need to brute force the password to get the key and then use it to get the data.
How is this normally done? Ex: how are keys secured so that only authenticated users can use them?
This is a web based application using php. It would be running on my local network.