Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Encryption Security

Javascrypt 210

NTK's weekly list of useful stuff includes a pointer to Javascrypt, a Javascript-based encryption utility. Handy.
This discussion has been archived. No new comments can be posted.

Javascrypt

Comments Filter:
  • by __aavhli5779 ( 690619 ) * on Friday November 28, 2003 @11:23PM (#7585752) Journal
    I had this idea myself, and abandoned it because I realized just how much of a sense of security people get from having that little "lock" in the corner*. Though there are plenty of advantages to a strictly client-side security model, I still wonder how the unwashed ignorati surfing ecommerce sites who have had "MAKE SURE YOU HAVE ENTERED AN ENCRYPTED PAGE" drilled into them will take to this sort of idea.

    Then again, if some sort of certification authority could be set up for Javascrypt-ed pages where the user was somehow assured that their data was equally protected as would be over https, then things would be more preferable. However, the byzantine red-tape behind getting a cert is possibly one of the things this technology would do away with best, and it would be a pity to remove such an obvious advantage.

    In any case, it's promising, and I hope it is successful.

    ___________________
    *also I am a poor coder
    • by herrvinny ( 698679 ) on Friday November 28, 2003 @11:36PM (#7585805)
      Well, you could just start up a cert org for producing Javascrypted certificates. Being a certification organization is primarily a trust issue. Open up your certification procedures, i.e. do you check an applicant's credit card, do you retain copies of drivers license, etc, or do you only require an email address, etc. Get yourself backed by an org like Truste, who will vouch for your integrity, etc. Then lobby for Microsoft, Netscape, and Mozilla to accept certs issued by you as valid, and you're ready to go. The technical issues behind creating a certificate are easy. If you want to read more into this, I suggest Googling for the Java 2 certification production scheme, etc. You can probably write up a quick scheme to create certs, sign them with your key, etc. After all, what is a cert? It's simply a document saying "Yup, site ______ can be trusted", signed with your private key. Then any MS, Netscape, or Mozilla client can simply validate the certificate using a widely available public key.
    • by Coryoth ( 254751 ) on Friday November 28, 2003 @11:41PM (#7585816) Homepage Journal
      I've often wondered a little about the demand for ultra high powerd crypto for e-commerce. It's all good in theory, but when people happily send their credit card number to any random website claiming to seel stuff that does an SSL connection, just what is the point?

      I seem to recall a quote about armoured cars being used to deliver a package from someone living under a bridge to someone living in a cardboard box.

      And can someone explain to me again why some people still persist with giving their credit card numbers over the phone "because its more secure"?

      Until the ideas actually sink in at a deep cultural level, we will continue to have all manner of stupid and contradictory actions from people who don't have the time to understand how all of this works. Hopefully it'll happen soon, right?

      Jedidiah
      • by Anonymous Coward
        It's all good in theory

        I think that is the entire point. Some businesses only put just enough effort into anything to make sure they won't get sued.

        Vendors of e-commerce packages come to mind. Their software makes just enough effort so that if anything goes wrong it's going to happen on the end-systems and is therefore be the fault of operator / client / user.

        Plausable deniability, etc.
      • It's all good in theory, but when people happily send their credit card number to any random website claiming to seel stuff that does an SSL connection, just what is the point?

        The point is that if you connect with SSL - then the website is not "random". I.e. you can verify that whoever pretends to be amazon.com - is really amazon.com. So you know who you are dealing with - you are not giving your credit card to somebody just pretending to be amazon.com.

        Also you made sure that nobody could sniff the credi
      • by swillden ( 191260 ) * <shawn-ds@willden.org> on Saturday November 29, 2003 @01:37AM (#7586143) Journal

        when people happily send their credit card number to any random website claiming to seel stuff that does an SSL connection, just what is the point?

        What's the point? It is useful to encrypt the data in transit, even if you don't know who it's going to -- then at least there's only one party who can steal your card number, instead of a dozen. Beyond that, if you connect via SSL, and your browser doesn't complain about an invalid certificate, you know a couple of things:

        1. The site has a certificate from a "trusted" certificate authority. While the level of verification that these CA's do isn't all that high, and they're not necessarily people you would trust a huge amount, you probably can trust that they've done some basic checking up on the site. The main thing is that they know who the legal entity is who paid for the certificate, which means that in the case of fraud, you have a better chance of being able to track the site owner down.
        2. The web site your browser thinks its connected to is the same one listed in the certificate. This means that if you think you're connected to a site you consider trustworthy (for whatever reason), chances are very high that you actually are connected to that site and are not being spoofed by someone who's hijacked your connection.

        So, there *is* value in that little lock on your browser window, even if the security isn't iron-clad. Note that the recent spate of Paypal hoax sites that ask for CC# and PIN do NOT use SSL. Why not? Because it's too hard, and too risky, for them to try to obtain a valid cert.

        And can someone explain to me again why some people still persist with giving their credit card numbers over the phone "because its more secure"?;

        Because it is! Under most circumstances anyway. Assuming you called them, and you looked up their phone number in some trustworthy place (like the phone book), then the odds that you're giving your credit card number to someone else are pretty small. Basically, the only way your number could be stolen would be if someone were tapping your line*. Not that wiretaps are all that tough to implement, but they're not that common, either, and more importantly they're not very easy to automate.

        Compare that to sending your CC# to a web site. How could that be hijacked? Well, to start with, your machine could be trojaned (worms can quicky infect millions of machines), so the simple act of typing your number in compromises it. Next, assuming no SSL, the data will go in the clear over better than a dozen network hops, more often two dozen, before arriving at the destination. The number can be copied anywhere en-route. Thanks to DNS spoofing, router hacks, compromised proxies, etc., that destination may not even be where you think it is.

        And computer-based CC# theft is eminently automatable. Packet sniffers can collect and report anything that appears to look like a number. Trojans can quietly search your whole machine looking for numbers. Faked sites can be set up to collect bunches of numbers.

        The fact that computer-based CC# theft can be automated means that the rewards are higher, i.e. it's worth the effort. It's also less risky: the scanning tools can send the data to electronic dead drops on hacked machines so that with a little care the attacker is almost completely untraceable (until he tries to *use* the numbers, but that's a separate issue). Contrast that with the effort and risk involved in tapping telephones.

        Until the ideas actually sink in at a deep cultural level, we will continue to have all manner of stupid and contradictory actions from people who don't have the time to understand how all of this works.

        But don't denigrate useful security measures just because *you* don't understand how they work!

        * Note that there is another obvious attack against phone-based CC# delivery: call re-routing. Someone with the ability to re-program the exchanges could get your call sent elsewhere. Again, though, this is labor-intensive and risky, and it requires a high level of access into telco systems, which is not easy to obtain (unlike 20 years ago).

        • "Because it is! Under most circumstances anyway. Assuming you called them, and you looked up their phone number in some trustworthy place (like the phone book), then the odds that you're giving your credit card number to someone else are pretty small. Basically, the only way your number could be stolen would be if someone were tapping your line*. Not that wiretaps are all that tough to implement, but they're not that common, either, and more importantly they're not very easy to automate."

          You missed a very
          • Most theft of CC numbers from on-line stores is done by hacking the database where they're stored. Some on-line retailers delete this information, most keep it around as a "convenience" for the customer, some just keep it around for no good reason.

            This means that the employee compromise opportunity is even greater with on-line retailers because it lasts longer.

            Actually, though, from a cardholder's point of view, all of this is irrelevant. At least in the US, law limits cardholder liability to $50, and

      • And can someone explain to me again why some people still persist with giving their credit card numbers over the phone "because its more secure"?

        Mostly because they're clueless. However, an unencrypted HTTP connection is probably less secure than a phone conversation, because it's much easier to sniff.

    • by Jerf ( 17166 ) on Saturday November 29, 2003 @12:40AM (#7585984) Journal
      The algorithm Javascrypt implements is absolutely useless for what you're talking about. AES is a symmetric encryption algorithm, which means that if you're going to send the data to some server using Javascrypt, at some point you need to communicate the key. If you send the key with the data (not to mention the .js for decryption), you've just royally wasted your time. This could only be useful if you agree to a key in advance using some non-internet connection method, in which case you're not going to go with a "cheap ass" encyption technique like this.

      (I do not mean to disparage the Javascrypt work, it's good stuff. But it's more useful to introduce people to encryption then for any practical use.)

      The genius of asymmetric encryption is that you can negotiate a secure connection without compromising it; it is not immediately obvious this should be possible and I consider it one of the larger mathematical results of the previous century. Extensions of that work have resulted in the ability to "sign" the keys during exchange. None of this applies to symmetric encryption because you have to agree on a key directly with the sender. (You could in theory still provide a third-party affirmation of the validity of a given key with symmetric encryption but not without giving the third party the key, which is undesirable. With asymmetric encryption the third party can sign a public key without knowing the private key that generated it, so even though Verisign signs your key it does not mean that Verisign can read through the resulting encrypted connection.)

      A lot of people seem to be laboring under this misconception. Javascrypt is a neat toy and a valuable educational tool. It is not and can not replace SSL or the SSL layer of the browser. If someone wants to implement a version of SSL it may be sort of possible, but since you don't get raw socket support it's going to be a non-compatible kludge, barring some extremely clever and probably not at all cross-platform hack.
      • Or you could tell your poker buddies the key in person and then send the stuff to them once you get home and have complete security with your friends, even if you know that they would never understand "real" encryption.

        That gives you security real cheap. I know something like GPG is free and assymetrical and all that, but it's not necessarily cheap in that you have to set it up at every point and educate all the users. This scheme doesn't even make you send an encrypted key to the person beforehand, whi

        • No highly secretive government assassin and spy program (or the equivalent) would use something like this for sure, but they're not the audience.

          Actually they can, and have; if you've got good physical security it's more secure then key exchange protocols (one more step that can't be broken), and it's not as inconvenient as one-time-pads, which as Schneier points out, is generally useless as it requires a secure sending of enough bits to send the entire message; why not send the message that way in the f
      • *snip*
        which means that if you're going to send the data to some server using Javascrypt, at some point you need to communicate the key.
        */snip*

        diffie hellman? i think you will need to exchange a key at some point even with ssl. you still have the problem with a man in the middle attack. but if you control both ends and are just trying to stop people from listening in you don't need a cert. or a third party. Just a thought. :)
        • Re:y^x(mod p) (Score:2, Insightful)

          by ariels ( 6608 )
          Diffie-Hellman is indeed an algorithm for producing a shared secret without authentication. And indeed, anything without authentication is exposed to a man-in-the-middle attack. That's why SSL doesn't use Diffie-Hellman for authentication, only for (help with) producing a shared secret key.

          In SSL, the client verifies the site by means of a certificate that the site provides; this cert has nothing to do with Diffie-Hellman. The site could use SSL to verify the client identity, but this option isn't used
      • The algorithm Javascrypt implements is absolutely useless for what you're talking about. AES is a symmetric encryption algorithm, which means that if you're going to send the data to some server using Javascrypt, at some point you need to communicate the key. If you send the key with the data (not to mention the .js for decryption), you've just royally wasted your time. This could only be useful if you agree to a key in advance using some non-internet connection method, in which case you're not going to

  • by Anonymous Coward
    this means that i can encrypt my webmail and the recepient can view it tooo gr8!
  • No GPG? (Score:5, Interesting)

    by Nonesuch ( 90847 ) on Friday November 28, 2003 @11:29PM (#7585775) Homepage Journal
    I've always thought that a Java implementation of public key encryption would be useful.

    For example, I'd like to be able to put up a page on my web site containing a Java applet with my embedded public key.

    That way I could finally remove my grandmother's AOL account from the exception list, the last obstacle standing between me and my "all incoming mail must be either signed by somebody I trust or encrypted with my public key" procmail rule.

    Requiring the sender to use their own CPU cycles to encrypt messages is a classic variation on the "micropayments" approach to reducing spam volumes...

    • Re:No GPG? (Score:5, Informative)

      by radish ( 98371 ) on Saturday November 29, 2003 @12:03AM (#7585877) Homepage
      There are more than a few out there already (not surprisingly!):

      RSA Crypto-J [rsasecurity.com]

      BouncyCastle [bouncycastle.org]

      Cryptix [cryptix.org]

      Flexiprovider [flexiprovider.de]

      There's a bunch more too - just google for them.

      Some of these are free, some are Free and some are neither. Personally, I've written banking software using the RSA libs (I tried to get use BouncyCastle but management didn't like the name!).
      • Personally, I've written banking software using the RSA libs (I tried to get use BouncyCastle but management didn't like the name!).

        We use bouncy castle. We just didn't tell the management. Really easy. :-). Works pretty well, too.

    • Re:No GPG? (Score:1, Informative)

      by Anonymous Coward
      Hushmail [hushmail.com] uses a Java applet to encrypt mail - maybe you could get your grandmother to use that. There are other Java crypto implementations, such as Cryptix. Packaging one as an applet shouldn't be too hard.
    • by autopr0n ( 534291 ) on Saturday November 29, 2003 @01:42AM (#7586152) Homepage Journal
      import java.io.*;
      import java.util.*;
      import java.security.*;
      import java.security.interfaces.*;
      import java.security.spec.*;
      import javax.crypto.*;
      import javax.crypto.interfaces.*;
      import javax.crypto.spec.*;
      import java.math.*;

      ....

      public static byte[] encrypt(byte[] enKey, byte[] data) throws Exception{

      //make sure our int is unsigned;
      //this means -45 --> 45 or whatever, as opposed
      // to not being digital signed with a public key crypto system :)
      byte unsigned_data[] = new byte[data.length+1];
      unsigned_data[0] = 0x7f;
      for(int i = 0; i < data.length; i++){
      unsigned_data[i+1] = data[i];
      }

      KeyFactory kf = KeyFactory.getInstance("RSA");
      RSAPublicKey k = (RSAPublicKey)kf.generatePublic(new X509EncodedKeySpec(enKey));
      BigInteger T = new BigInteger(unsigned_data);
      return T.modPow(k.getPublicExponent(), k.getModulus()).toByteArray();
      }

      //your welcome
      • by Anonymous Coward
        //your welcome

        What about "my" welcome? If you leave my welcome alone, I'll leave your welcome alone.
    • Requiring the sender to use their own CPU cycles to encrypt messages is a classic variation on the "micropayments" approach to reducing spam volumes...

      Which all sounds quite nice until you realize that it's a price that drops by 50% every 18 months or so. If everybody on the face of the earth started doing the same thing tomorrow, it'd take at most a few months before the spammers got the presses warmed back up.

      Sorry, but we aren't going to DDOS the spammers. We need a system for holding them accountable
      • Requiring the sender to use their own CPU cycles to encrypt messages is a classic variation on the "micropayments" approach to reducing spam volumes...

        Which all sounds quite nice until you realize that it's a price that drops by 50% every 18 months or so.

        I can't be bothered to look up the source, but I read somewhere that someone is working on a memory-bound solution, rather than CPU-bound. Since memory access speeds do not accelerate at the same rate as processor clock speeds, this should work better

  • by Anonymous Coward on Friday November 28, 2003 @11:31PM (#7585781)
    Since javascript has to be the second biggest backdoor into your computer since MS Windows, it never ceases to amaze me that people can take this stuff seriously.
    • by Phroggy ( 441 ) *
      Are you talking about JavaScript itself, or a particular implementation of it?
    • Since javascript has to be the second biggest backdoor into your computer since MS Windows, it never ceases to amaze me that people can take this stuff seriously.

      In an effort to win the browser wars by adding functionality, Microsoft dug their own security grave by adding a File System Object to their scripting engines - without it, many browser-based exploits won't work.

      Goes to show that your bad design decisions will always catch up with you and that adding security as an afterthought never works.

  • useful (Score:5, Interesting)

    by TedCheshireAcad ( 311748 ) <ted AT fc DOT rit DOT edu> on Friday November 28, 2003 @11:32PM (#7585789) Homepage
    I've used javascript cryptography routines before, once in a php project for authentication, used javascript to generate an md5 hash of the password and sent the hash over http.

    I considered it a hack, but it's what the client wanted, and who am I, the developer, to question the client's motives? Cheap bastard, didn't want to pay for an SSL cert. Just hope no one passes the hash. ;)
    • Re:useful (Score:3, Interesting)

      Yahoo mail uses cheap bastard technology then :)

      I don't see why this is a problem for *hiding passwords*, but the hash can be intercepted and replay attacks can be done. What you should do would be to have the client request a single-use time-limited challenge nonce from the server and hash the password together with it, and compare with the original.
      • Yeah, I explained to the client the concept of "passing the hash" and if someone was sniffing the network traffic that a hashed password wouldn't matter and blah blah blah.

        I remember his words were "well, it's secure enough for our purposes". So rather than argue, I simply went ahead and wrote it. C'est la vie.
      • Doesn't Yahoo! do that, they issue a particular key (as a hidden html form element) that gets hashed with the password, I imagine they store this key in the session variables in the server.

        Ah, I remember the fun trying to use tcl to create a program that can download and convert emails from the Yahoo web mailbox, the project is still in my ever-full "Pending" list, unfortunately.
      • To prevent this:

        take a hash of the password (Ph1) as the passtoken.

        now, on the client, hash the password -> Ph1
        do Md5sum(Ph1 XOR SessionID) and send this. Compare on server, where you have the same two pieces of information. Now a replay attack wont work as often (only with the right session id, which is a very slim chance.

        The MD5 in the last step is not a hash of a hash, which would yield no improvement. By introducing the SessionID you introduce new info. With the hash, you distribute this info even
    • Re:useful (Score:1, Insightful)

      by Anonymous Coward
      It's worse than a hack. It accomplishes nothing.

      People use encryption when sending passwords, so others can't intercept the passwords and use them. Now you're sending hashes over the network. Others can just intercept the hashes and use them. The attackers won't know what the original passwords were, but what do they care? They can still log in to those accounts.
      • While I agree with you that it's not the best security in the world it's not completely useless to send the password hash over the network.

        In the overall scheme of things, the risk of someone intercepting traffic is minimal compared to the risk of someone grabbing the entire password database. The real point of using the password hash is to keep the cleartext password out of a database.

        Let's face it. It's a lot less time consuming to just grab an entire database than it is to intercept all the traffic (ev

    • Who says you have to pay for an SSL cert? Can't you just generate your own with OpenSSL (or whatever it's called)?
    • use a salt (Score:5, Informative)

      by autopr0n ( 534291 ) on Saturday November 29, 2003 @01:50AM (#7586171) Homepage Journal
      Rather then passing hash(password) send in hash(salt + password), where hash is a random string sent by the server. The server then compares the sent value to it's own hash of salt + password. If you don't want to deal with sessions, you could simply change the salt every hour or 5 minutes or whatever.

      You could also do hash(salt + hash(password)), that way you don't need to keep the password in the DB.
  • by yomahz ( 35486 ) on Friday November 28, 2003 @11:35PM (#7585798)
    There are a number of servers that support server-side javascript. I recently had a project where a remote office needed to communicate with a servlet based webpage using RC4 ecnrypted parameters.

    The remote office didn't know much programing so I wrote a RC4 and base64 implementation in Javascript for them to implement server side.
  • Nice approach (Score:4, Interesting)

    by randall_burns ( 108052 ) <randall_burns@@@hotmail...com> on Friday November 28, 2003 @11:41PM (#7585819)
    This stuff is nice because Javascript is a very accessible language(i.e. lots of people know it). This is stuff that can be maintained in situations where other approaches aren't really practical.


    I'm also glad to see folks doing more with the capabilities within a browser. The folks that are taking this the furthest that I've seen are the folks at Technical Pursuit [technicalpursuit.com].

  • by nicwolff ( 91386 ) on Friday November 28, 2003 @11:44PM (#7585826)
    I've been poking around trying to generate Web-site passwords by hashing the hostname and a master password, and I've come up with this bookmarklet [angel.net] which takes the first 8 chars of the hex representation of the MD5 hash.

    This means you only have to remember one master password, and each site you register for gets its own unique password - instead of using the same throwaway password all over so you've given your whole online identity to each site's admins...

    I've been meaning to find a crypto guy to ask if I could just use CRC32 to hash the input string, since MD5 is too much Javascript to bookmark in IE. I know it's not a secure way to checksum a file, but given a CRC32 hash and part of the input, can you recover the other part? Anybody?
    • by cryptor3 ( 572787 ) on Saturday November 29, 2003 @01:14AM (#7586073) Journal
      I've taken a look at your site, and I see a couple of possible problems with your scheme.

      First off, the master password thing makes me nervous. If your master password is compromised, then all your previous passwords are compromised. I think that there are ways to mitigate this risk, by using salts. I'm not sure about this, but it's my gut feel.

      Second, to your question. You probably do not want to use CRC32 to hash the input. When you take MD5(masterpw + siteurl) = sitepw, you're relying on the fact that if someone gets your sitepw, they still won't be able to recover the masterpw even if they know the url.

      It's a little late, and despite my nick, I'm a bit rusty on the mathematical details at the moment. My inclination is that CRC32 isn't a good idea for absolute security. Reply if you want to chat about this off-thread, and I'll get in touch.
    • CRC32 (Score:3, Informative)

      by Black Acid ( 219707 )
      given a CRC32 hash and part of the input, can you recover the other part?

      Maybe, you may find this tutorial useful: CRC and how to Reverse it [woodmann.com].
  • by eurleif ( 613257 )
    A few years ago Me: I know Java! Silly person: Cool, you can make applets! A few less years ago Me: I know Java! Silly person: Cool, you can do DHTML! Now Me: I know Java! Silly person: So you can do encryption!
  • by eviltypeguy ( 521224 ) on Saturday November 29, 2003 @12:06AM (#7585890)
    Am I the only one that read the headline as:

    "Java's Crypt"

    Java dead already? Odd...

    I thought, geez the Slashdot Trolls really *have* taken over...
  • Not new... (Score:5, Informative)

    by evilviper ( 135110 ) on Saturday November 29, 2003 @12:08AM (#7585894) Journal
    For quite a good long time now (in computer terms that is) Yahoo has been doing this same thing. If you log-in without entering SSL mode, you need to have javascript enabled in your browser so that the script can MD5-encrypt your password.

    Despite the whole client-side-encryption advantage, I dislike how much easier it would be to perform a man-in-the-middle, or a number of other exploits. I will admit, however, that I am quite concerned with the prospect of honeypot SSL sites, designed to steal info, but I think the former is more likely. So, for now, I am sticking with SSL. Maybe in conjunction with SSL, this would make an ideal solution. Of course, SSH would be even better...
    • Maybe in conjunction with SSL, this would make an ideal solution. Of course, SSH would be even better...
      Um, SSH uses SSL. How is it, then, better than SSL?
      • Um, SSH uses SSL. How is it, then, better than SSL?

        OpenSSH uses SSL, yes, but only for it's ciphers really. SSH does MUCH MUCH more than SSL does.
  • by radish ( 98371 ) on Saturday November 29, 2003 @12:09AM (#7585898) Homepage

    I'm already seeing people mix the two up in this thread, let's set this down straight:

    JavaScript/ECMAScript: Untyped yucky scripting language developed by Netscape (IIRC) and built into browsers so you can have image rollovers.

    -- has nothing whatsoever to do with --

    Java: OO, multi-threaded, multi-platform language used occasionally on websites as applets, but much more frequently on the back end for app servers and the like.

    This has been a public information posting.
    • by Webmonger ( 24302 ) on Saturday November 29, 2003 @12:50AM (#7586003) Homepage
      It's true that JavaScript and Java have little in common. The name was a marketing ploy. (It was originally called LiveScript.) But JavaScript does have types-- in fact, it's an oo language.

      It's just weakly typed.
    • by Vagary ( 21383 )
      It's not yucky! JavaScript is one of the most elegant of scripting languages. You have features like higher-order functions (well kinda), basic OO, and built-in regular expressions. C-like syntax with simplicitly totally unlike Python and Perl. And talk about platform independence! If JavaScript had just a few more libraries I think I'd advocate it as a great beginner language...
      • The main problem is it's *almost* elegant, but not quite 100% there - in actualy use it always seems like you need some ugly half-assed hack to do something that should be simple.

        For example, say in a form you want to validate a field as soon as the person enters it (i.e. they type a bad value and it returns focus to the field). Sounds simple right? Just trap the onblur event, test the field, and call focus() if it fails.

        Not so... most browsers will ignore focus called from within onblur (because the "blu
        • That's a flaw in the browser's implementation of javascript, not javascript itself. Or so it would seem to me at this hour...

      • by oGMo ( 379 )

        JavaScript is pretty elegant... if you want a more "full-fledged" language that has similar elegance, even more simplicity/grace, and more libraries, try ruby [ruby-lang.org]. Don't let a few surface features or initial impressions fool you into thinking it's anything like Perl (or Python). It would probably make a good beginner language; it certainly makes a great "advanced" language. ;-)

        • I think a beginner language should have C-like syntax (I realise Ruby's is vaguely C-like, but not enough in my opinion) if you expect your beginners to eventually be programming in the real world (full of C, Java, Perl, and PHP). (If the syntax isn't important, then why not just start them on Scheme! :)

          One of the nice things about JavaScript is that every computer already has an interpreter. (Although not all have a debugger. :( Also, Ruby doesn't have a large enough user base to have ubiquitous document

  • This isn't secure (Score:3, Insightful)

    by ArkanWindsong ( 536198 ) on Saturday November 29, 2003 @12:21AM (#7585927)
    The problem with hashing a password with js and then just sending the hash is that the hash effectively becomes the password. i.e. all someone needs to do is eavesdrop your http session and record the hash value. The attacker can then send that same hashed value to the server and login as you.

    The server must hash the password itself or it isn't secure. Or the hash value must be protected as much as the password.
  • by Anonymous Coward
    Kudos to the authors, but really, this is nothing new.
    Symmetric encryption in java script has been around for a long time. What the world needs(tm) is a good implementation of RSA/ElGamal asym crypto in javascript that doesn't make your computer seem like it took a hit of dank before running through primality tests and arbitrary size integer mods and pows.
    Because of the nature of that problem, I don't forsee this really coming to fruition, so if you need asym, you'll be resigned to client side Java or nati
  • by gusnz ( 455113 ) on Saturday November 29, 2003 @12:32AM (#7585957) Homepage
    Have a look at Yahoo Mail's login page [yahoo.com] (you may have to log out of Yahoo services completely to see it). If you view source on that, you'll see:
    /*
    * A JavaScript implementation of the RSA Data Security, Inc. MD5 Message
    * Digest Algorithm, as defined in RFC 1321.
    * Copyright (C) Paul Johnston 1999 - 2000.
    * Updated by Greg Holt 2000 - 2001.
    * See http://pajhome.org.uk/site/legal.html for details.
    */
    They're using a JS implementation of the MD5 algorithm to calculate client-side hashes of user passwords before form submittal.

    It's definitely an interesting approach especially of a site that size, when you look at how much server CPU usage a full SSL login connection would take. And in the event that someone compromises a secure server, your password wouldn't be available to the attacker, only the hash.

    Plus, JS is free to implement (unlike a SSL cert) so hopefully if this technique catches on, more mom-n-pop sites will wind up using it instead of a totally unencrypted login connection.
    • That's cool to know, but I don't think that this is true:

      And in the event that someone compromises a secure server, your password wouldn't be available to the attacker, only the hash.

      If you look at the code on the site, they have a 'challenge' value that is appended to the hash of the password, so to calculate the challenge response you need both the 'challenge value' (a.k.a. a nonce) and your password. The server needs the same thing. I think that this same technique is used in APOP.

      The only way

      • They could compare hash(challenge + hash(password)). I.e. they have you append a challenge value to the hash of the password, and then do the same on their end with stored-hash-of-password rather then hash(password)

        Also, key distribution is not a problem with public key systems.
        • Re:Nope (Score:1, Interesting)

          by Anonymous Coward
          Also, key distribution is not a problem with public key systems.

          Sure it is. I am your bank. This is your bank's public key. Now encrypt your wire transfer details and deposit some of that sweet green wampum, baby!

          It's so much of a problem that Certificate Authorities can exploit their positions to turn doing practically nothing into a goldmine, and even then they screw up sometimes and get social-engineered into issuing key pairs to people who are not the convicted monopolists they claim to be.
      • ...to calculate the challenge response you need both the 'challenge value' (a.k.a. a nonce) and your password. The server needs the same thing.

        I suppose it depends on how the backend works. I imagine Yahoo for instance have a heckload of servers; perhaps if they have dedicated authentication servers that do all the hashing and authentication, a compromised web server still wouldn't allow password retrieval if it was just a pass-through of the hash.

        I know what you mean though, the password must be stored

    • * Copyright (C) Paul Johnston 1999 - 2000.

      Incidentally, this one is pretty widespread (! [slashdot.org]), available from here [pajhome.org.uk]. Walker uses another one by Henri Torgemane (no home page that I could find).

      • Yeah, home pages are good. Someday I'll write one.

        In the meanwhile, my original page has been mirrored at this page [geocities.com] by a kind soul.

        The pajhome source code is arguably prettier than mine, and should almost always be used, rather than mine.
        To my defense, mine was developed and works under netscape 2.0, which probably makes it the first md5 implementation in javascript ever.
        I have a nagging feeling pajhome's version requires at least NS3/IE3, although I haven't checked that.

        At the time, after I bench

  • Why this is useful (Score:3, Interesting)

    by EmCeeHawking ( 720424 ) on Saturday November 29, 2003 @12:58AM (#7586020)
    I see a lot of posts here wondcering how this is useful and why not just use PGP.

    I can't imagine people really trust PGP anymore. No longer open source, no longer affiliated with Phil Zimmerman... and his statement when he left was scary.

    For those who don't know, Phil stated when he left that every PGP product released while he was there contained no hidden back doors. Knowing that companies like PGP were being pressured, it makes me think the creative differences were them wanting to build something in that he thought shouldn't be in.

    • EmCeeHawking writes:

      I can't imagine people really trust PGP anymore. No longer open source, no longer affiliated with Phil Zimmerman... and his statement when he left was scary.

      PGP is not "open source", but like Solaris, source code is published, anybody can download full source at no charge.

      Phil Zimmermann is on the "Technical Advisory Board [pgp.com]", along with Bruce Scheier and others.

      What statement are you referring to?

  • by WoTG ( 610710 ) on Saturday November 29, 2003 @01:20AM (#7586094) Homepage Journal
    I've recently discovered (or maybe I saw it on another /. article...) this nifty javascript "mailto" encoder [hiveware.com]. It creates drop in javascript that obliviates the need to put email addresses in cleartext on a public webpage. The JS created mailto links work just like they should. Yes, spam bots could learn to read javascript, but, they won't for a while...
  • by autopr0n ( 534291 ) on Saturday November 29, 2003 @01:33AM (#7586125) Homepage Journal
    I mean really, people are confused enough about the difference between Java and Javascript (which basically have nothing to do with each other other then some brain-dead attempt at synergistic marketing. JS was originally going to be called Livescript)
  • "When I find myself in times of trouble, PKZ, he comes to me.
    Speaking words of wisdom, "PGP, PGP."

    If you're so afraid that the post PKZ NAI PGP is tainted, don't use it.

    PGP 6 and PGP 5 seem to run just fine on my PowerMac 5500/225 under OS 8.6.

    I'm currently using PGP 7 Pro.

    If I'm not mistaken, PKZ is now at PGP, Inc and seems happy enough with their implimentation of PGP.
  • Stealing and modifying some RC4 code, I made a self-contained Javascript/PHP CipherSaber [gurus.com] encoder/decoder.

    Boring I know, but at least it can create self-decrypting HTML files where the ciphertext and decryption code is all self-contained. With such output, any* JS-enabled browser can decrypt the file without a net connection. Here's a sample [speakeasy.org] (use password "test" and 1 loop). This idea can be modified to fit almost any encryption scheme; RC4 just seemed like a good mix of security and extreme ease of im
  • 'The sole reason for encryption is to protect privacy.'

    Statements like this from developers of a 'high-security data encryption solution' make me worried.

    And assertions that transparency will make software secure always presume that someone with the 'required expertise to pass judgment' will actually do so.

    I thought MD5 was cracked?

  • More excellent work from John Walker. As usual stupidity abounds on Slashdot with most of the criticism way off the mark. "This is useless because he didn't customize it to my every need". Whatever.

    A useful fact the detractors haven't mentioned is that in light of the recent 'academic break' paper published by Courtois and Pierpzyk, AES and several other ciphers should be no longer considered suitable for those with a high level of paranoia.
  • Useful teaching tool (Score:5, Interesting)

    by ca1v1n ( 135902 ) <snook@noSPam.guanotronic.com> on Saturday November 29, 2003 @04:58AM (#7586495)
    Schneider's javascript Rijndael implementation makes a great teaching tool, because it's so easy to modify it to show intermediate steps. Sure, you can do this in any other language, but it's especially compact in javascript, and anyone who has ever programmed in ANY modern language can read javascript, which cannot be said of plenty of other languages. For my architecture class we had to implement Rijndael with synthesizable modules, and that implementation saved us countless hours, because it was so easy to tweak things in the javascript implementation that we could often save time by deliberately introducing bugs into the reference implementation and seeing if it had familiar effects. Anyone who's ever used FPGA Advantage probably knows how much of a pain in the ass it can be debugging with that alone.
  • by sdsykes ( 531948 ) on Saturday November 29, 2003 @05:49AM (#7586587)
    This [port5.com] is a similar javascript utility aimed at encrypting your entire web page. It is used for putting secure content on an open access web server. You can only view the content if you happen to know the key. It's very cool, and has been around for a long time. Secure, small and fast.
  • by dodell ( 83471 ) <dodell@sTEAitetronics.com minus caffeine> on Saturday November 29, 2003 @08:41AM (#7586921) Homepage
    I created a similar thing for Flash ActionScript called ActionCrypt [sf.net]; although it's still in progress. You might want to check it out; Javascript and ActionScript are very similar (as they're both based on the same syntax).

  • Uhmm, perhaps I'm paronoid, but shouldn't you think twice about getting security advice from John Walker? ;)

    Seriously, good stuff. Perhaps somebody will come up with an open, secure way like this to replace that behemoth Entrust TruePass (which only runs in browsers that are 3 or 4 releases behind in their Java support - MS JVM but no Java Plugin!).

  • I'd find it hard to think of anything that was javascript based as being handy. Javascript has caused way more problems than it has solved.

    I work for a company that uses javascript to do a few things for their web based apps, and it doesn't even work correctly for the few things it needs to do between browser revisions. Supporting the customers often involves having them upgrade or downgrade their browsers.

"I am, therefore I am." -- Akira

Working...