Skip to content

Commit

Permalink
Update draft-irtf-cfrg-cpace.md
Browse files Browse the repository at this point in the history
Rephrased section refering to "Do not expose K".
  • Loading branch information
BjoernMHaase authored Oct 11, 2024
1 parent 9f8448d commit 14b8bf4
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions draft-irtf-cfrg-cpace.md
Original file line number Diff line number Diff line change
Expand Up @@ -723,8 +723,8 @@ all variable-size input strings results in a so-called prefix-free encoding of t

## Key derivation {#key-derivation}

Although already K is a shared value, it MUST NOT itself BE used as an application key. Instead, ISK MUST BE used. When facing an quantum-computing adversary
with capability to calculate two discrete logarithms, leakage of K to can lead to classical offline dictionary attacks.
A CPace implementation MUST NOT expose K, because it may enable offline dictionary attack
on the password, and it does not provide authentication of ADa and ADb.

As noted already in {{protocol-section}} it is RECOMMENDED to process ISK
by use of a suitable strong key derivation function KDF (such as defined in {{?RFC5869}}) first,
Expand Down

0 comments on commit 14b8bf4

Please sign in to comment.