According to documentation Frost is using "MAC then Encrypt" scheme. But plain SHA256 is used as a MAC. Better use proper MAC, like HMAC-SHA256 keyed with a separate key derived from the master key. This will avoid leaking hashes of unencrypted data to the adversary, which could compromise data confidentiality.
According to documentation Frost is using "MAC then Encrypt" scheme. But plain SHA256 is used as a MAC. Better use proper MAC, like HMAC-SHA256 keyed with a separate key derived from the master key. This will avoid leaking hashes of unencrypted data to the adversary, which could compromise data confidentiality.