-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Why use DJSON and not the browser's native JSON.stringify, JSON.parse functions? #1
Comments
DJCL is written in DJS, a subset of JavaScript that doesn't allow the |
I see, how was the parser developed? Was it generated using a parser generator with formal proof? I consider parsing as area to always handle carefully |
OK. So considering you do not use browser native functions, the security of CCM and RSA padding may be affected by weak random or nonce reuse when you provide IV from the outside ? For instance, SJCL uses window.crypto.getRandomValues() how should we safely provide randomness while keeping your assumptions true. |
Le 05/06/2014 20:05, François Proulx a écrit :
That's an excellent consideration, parsing is often security critical |
It is not a problem in itself - you must supply the IVs and nonces to |
No description provided.
The text was updated successfully, but these errors were encountered: