[squeak-dev] RE: [Pharo-dev] FFI blowfish for encrypting / decrypting [WAS] Re: How to encrypt a password?

Ron Teitelbaum ron at usmedrec.com
Mon Feb 17 22:25:47 UTC 2014


Hi Mariano,

 

Before I give you an answer, you should never ever ever not even for any
reason, ever, did I mention ever, store a user's password.  You can hash a
password, which means you store the hash value of the password.  You can
make it more secure by salting the hash or embedding your own key to the
hash, or doing a number of other things.  But you should always store an
encrypted hash and never a recoverable password.  The way this works is that
your user knows the password and can generate a hash at any time that you
can compare.  You store the hash of the password to compare.  The reason for
this should be obvious.  You don't want anyone to have access to that
password.  Not even programmers.  Your program doesn't need it either since
the user can generate that hash for you at any time.  It really is all you
ever need to store.

 

If you are looking for a simple cypher for something other than a password
how about ARC4 from www.squeaksrouce.com/Cryptography 

 

|key cText pText|

key := SecureRandom picker nextBits: 254. 

cText := (ARC4 new key: key) encrypt: 'This is a very secure but meaningless
string' asByteArray.

pText := (ARC4 new key: key) decrypt: cText.

^pText asString

'This is a very secure but meaningless string'

 

It's pretty simple.  To get the plainText back all you need is the key.  

 

All the best,

 

Ron Teitelbaum

 

From: Pharo-dev [mailto:pharo-dev-bounces at lists.pharo.org] On Behalf Of
Mariano Martinez Peck
Sent: Monday, February 17, 2014 4:17 PM
To: Pharo Development List; glass at lists.gemtalksystems.com; The
general-purpose Squeak developers list
Subject: [Pharo-dev] FFI blowfish for encrypting / decrypting [WAS] Re: How
to encrypt a password?

 

 

On Thu, Nov 21, 2013 at 3:53 PM, Paul DeBruicker <pdebruic at gmail.com> wrote:

Mariano Martinez Peck wrote

> Hi Paul, and just to be sure I understand...none of them could work as a
> two-way encryption, right?
> The only one is your Pharo's version of Blowfish but that only works with
> 8
> chars long. Is it like this? Or is there any other two-way encryption?
>
> Thanks!
>

> --
> Mariano
> http://marianopeck.wordpress.com


Yes that's right.  The PasswordHashingFFI stuff is all one way encryption.
Blowfish is two way, and the current implementation only works for 8 byte
chunks.  I stopped working on it when the Smalltalk bcrypt implementation I
wanted proved to be 5000x times slower than the FFI version. Someone needs
to add the CBC part to Blowfish to encrypt longer strings.  I do not know of
another in image two way encryption scheme, but there may be something in
the Cryptography repo.  I'm not sure.



 

Hi Paul,

 

Sorry for the cross posting. 

 

I was using the Smalltalk version of the Blowfish you did to encrypt and
decrypt things. But now I realize it is very very slow for the usage I need.
You seem to have faced the same problem. 

 

I am encrypting pieces of 8 characters long. But I wonder if the decryption
is available as well in FFI version? I see #ffiCrypt:with:   but nothing to
decrypt...

 

Thanks in advance 




 

-- 
Mariano
http://marianopeck.wordpress.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.squeakfoundation.org/pipermail/squeak-dev/attachments/20140217/7a4ee805/attachment.htm


More information about the Squeak-dev mailing list