Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

hex string is too short, padding with zero bytes to length *** WARNING : deprecated key derivation used. Using -iter or -pbkdf2 would be better. #59

Open
ghost opened this issue May 10, 2019 · 2 comments

Comments

@ghost
Copy link

ghost commented May 10, 2019

Defalult encrypt is always warning,plase add -pbkdf2 -iter 1024 to update

openssl enc -aes-256-cbc -md sha512 -pbkdf2 -iter 1024 -salt -in InputFilePath -out OutputFilePath

follow by https://crypto.stackexchange.com/questions/20941/why-shouldnt-i-use-ecb-encryption

@ghost
Copy link
Author

ghost commented May 10, 2019

ss@SSS ~/t/abc> transcrypt --version
transcrypt 1.1.0

ss@SSS ~/t/abc> uname -a
Linux SSS 5.0.9-2-MANJARO #1 SMP PREEMPT Sun Apr 21 07:11:08 UTC 2019 x86_64 GNU/Linux

@rnhmjoj
Copy link

rnhmjoj commented Nov 13, 2019

I'm not a cryptographer but using MD5 to generate a key is pretty bad IMHO.
A real KDF (PBKDF2 like openssl rightly suggest) with moderate number of iterations should keep the secrets safe from a brute force attack.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant