Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

2
  • Thanks for the quick response! You are right, the IV and the rest of parameters must to be included in the HMAC input, I missed this detail in my incomplete description. Efficiency (second point) is not a problem in this case, because these messages will be very infrequent. I prefer to use a very expensive function in order to avoid brute force and dictionary attacks. Commented Oct 24, 2014 at 19:51
  • <<compute SHA-256 on the bcrypt output, yielding 256 bits; the first 128 bits ...>> This is a good idea. In fact, while reading your response, I’ve just noticed that I planned to do that at some point (months ago) and I forgot about that (too many concurrent projects <facepalm> XD). I will do some research on GCM, I have never used it. We need to implement that in Java/Android. Any suggestion? The standard Java 8 implementation seems to be buggy. Thanks, again. Commented Oct 24, 2014 at 19:55