[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: [OASIS Issue Tracker] Created: (OFFICE-3703) Proposal: ODF 1.3Protection-Key Enhancements
Proposal: ODF 1.3 Protection-Key Enhancements --------------------------------------------- Key: OFFICE-3703 URL: http://tools.oasis-open.org/issues/browse/OFFICE-3703 Project: OASIS Open Document Format for Office Applications (OpenDocument) TC Issue Type: Improvement Components: Table, Text Affects Versions: ODF 1.2 Environment: This is an enhancement, described in terms of changes to OpenDocument-v1.2-cs01. Reporter: Dennis Hamilton Fix For: ODF 1.3 CSD 01 The use of password hashes in easily-discovered XML element and attribute values is subject to compromise of the hashed password. Although the use of increasingly-stronger digest algorithms may lengthen the time required for carrying out a brute-force attack on the hash, memorable passwords remain subject to compromise and the attack becomes easier as processor technology advances. In addition, the presence of hashes in plain sight in XML documents allows the digest value to be easily compared with the same digest value elsewhere, revealing worthy targets to an adversary. In addition, the digest value is easily removed/replaced. And an extracted digest value can be repurposed for malicious purposes. This proposal introduces two protection-key digest algorithms that are intended to mitigate (but not eliminate) risks associated with use of digest algorithms and provision of the digests in plain view in XML documents. -- This message is automatically generated by JIRA. - If you think it was sent incorrectly contact one of the administrators: http://tools.oasis-open.org/issues/secure/Administrators.jspa - For more information on JIRA, see: http://www.atlassian.com/software/jira
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]