Re: Use case classification, and associated security models

Hi Vijay,

Thank you for writing this up.

I agree that the design of the Web Cryoto API can be divided into two parts:
- key management
- the actual crypto operations that take a key object

As for the three scenarios of key management you described, the
difference between scenario 1 (Ephemeral or local-only keys) and
scenario 2 (Ephemeral keys obtained through key agreement) does not
seem important for the API design. How do you think the API should
reflect the different security models between scenario 1 and scenario
2?

To me, the important distinction is between scenarios 1 & 2 and
scenario 3. In scenarios 1 & 2, the browser knows which website
generates or imports/derives the key.  That knowledge is recorded
persistently and can be used to determine which website is authorized
to open or use a key in the future if the key is persistent.

Wan-Teh

Received on Tuesday, 12 June 2012 23:54:24 UTC