Passwords should not be encrypted, they should be hashed with a slow password hashing function that's designed to slow down password guessing attacks. See How to Safely Store Your Users' Passwords in 2016.
A Key
object can be saved to a string by calling its saveToAsciiSafeString()
method. You will have to save that string somewhere safe, and then load it back
into a Key
object using Key
's loadFromAsciiSafeString
static method.
Where you store the string depends on your application. For example if you are
using KeyProtectedByPassword
to encrypt files with a user's login password,
then you should not store the Key
at all. If you are protecting sensitive data
on a server that may be compromised, then you should store it in a hardware
security module. When in doubt, consult a security expert.
Either you've encountered a bug in this library, or your system doesn't support the use of this library. For example, if your system does not have a secure random number generator, this library will refuse to run, by throwing that exception, instead of falling back to an insecure random number generator.
If you're getting this exception, then the string you're giving to
loadFromAsciiSafeString()
is not the same as the string you got from
saveToAsciiSafeString()
. Perhaps your database column isn't wide enough and
it's truncating the string as you insert it?
Encryption does not, and is not intended to, hide the length of the data being encrypted. For example, it is not safe to encrypt a field in which only a small number of different-length values are possible (e.g. "male" or "female") since it would be possible to tell what the plaintext is by looking at the length of the ciphertext. In order to do this safely, it is your responsibility to, before encrypting, pad the data out to the length of the longest string that will ever be encrypted. This way, all plaintexts are the same length, and no information about the plaintext can be gleaned from the length of the ciphertext.