This is an archived snapshot of W3C's public bugzilla bug tracker, decommissioned in April 2019. Please see the home page for more details.

Bug 18977 - Multiple encryption rounds
Summary: Multiple encryption rounds
Status: NEW
Alias: None
Product: Web Cryptography
Classification: Unclassified
Component: Web Cryptography Use-cases Document (show other bugs)
Version: unspecified
Hardware: All All
: P2 enhancement
Target Milestone: ---
Assignee: Harry Halpin
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2012-09-22 23:51 UTC by Richard Mitchell
Modified: 2017-09-07 01:20 UTC (History)
1 user (show)

See Also:


Attachments

Description Richard Mitchell 2012-09-22 23:51:08 UTC
It's not an uncommon scenario to require some content to pass through multiple rounds of encryption or decryption. The current, asynchronous nature of all the encrypt, decrypt, key generation functions limits this use case.

For example, if a key is required to go through 50,000 rounds of encryption before use, it would be next to impossible to perform this task with the current API without exceeding the call stack limit. Furthermore, cutting the call stack by using window.setTimeout, even with a delay of 0, dramatically increases the amount of time taken to run the same number of rounds compared to the equivalent transformation performed with an unlimited call stack, or as a series of synchronous operations.