Skip to content
This repository has been archived by the owner on Jun 7, 2023. It is now read-only.

App uses weak key derivation #177

Open
sonOfRa opened this issue Jun 1, 2018 · 0 comments
Open

App uses weak key derivation #177

sonOfRa opened this issue Jun 1, 2018 · 0 comments

Comments

@sonOfRa
Copy link

sonOfRa commented Jun 1, 2018

While the weak, preset IV was already reported in August (#60), the app also uses a weak way to derive the key for the encryption. This combination makes the wallet seed very vulnerable.

https://github.com/iotaledger/android-wallet-app/blob/master/app/src/main/java/org/iota/wallet/helper/AESCrypt.java#L40

Here, a single iteration of SHA256 is used to hash the password. At the very least, a construction like PBKDF2 should be used to derive a key. There's also dedicated key derivation functions like argon2 or scrypt that can be used for this, and should be preferred over PBKDF2, but they require external libraries.

Before you answer "but this app is deprecated": Please consider that in order to install the new wallet, you have to sign up for a beta program. Every user who doesn't sign up for the beta program is vulnerable, and has been vulnerable for a very long time. Please consider fixing these issues and pushing a new release to make users of this app secure.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant