W3C home > Mailing lists > Public > public-webcrypto@w3.org > June 2012

Re: Use case classification, and associated security models

From: Wan-Teh Chang <wtc@google.com>
Date: Tue, 12 Jun 2012 16:53:55 -0700
Message-ID: <CALTJjxG_LQ0gQC+62LBStiG2TjYfx7iXiJ-E1=7yWLz+jp1S-w@mail.gmail.com>
To: Vijay Bharadwaj <Vijay.Bharadwaj@microsoft.com>
Cc: "public-webcrypto@w3.org" <public-webcrypto@w3.org>
Hi Vijay,

Thank you for writing this up.

I agree that the design of the Web Cryoto API can be divided into two parts:
- key management
- the actual crypto operations that take a key object

As for the three scenarios of key management you described, the
difference between scenario 1 (Ephemeral or local-only keys) and
scenario 2 (Ephemeral keys obtained through key agreement) does not
seem important for the API design. How do you think the API should
reflect the different security models between scenario 1 and scenario

To me, the important distinction is between scenarios 1 & 2 and
scenario 3. In scenarios 1 & 2, the browser knows which website
generates or imports/derives the key.  That knowledge is recorded
persistently and can be used to determine which website is authorized
to open or use a key in the future if the key is persistent.

Received on Tuesday, 12 June 2012 23:54:24 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 21:17:10 UTC