Entropy pool security flaw fix and enhancements
Pre-release
Pre-release
######Security flaw fix######
- A bug was introduced where in SLASH 4.86 that the bitrate portion(output) of the Slash hash internal state was effectively erased on the first of two runs between each entropy capture/generation cycle. This has been fixed via creating a temporary instance of slash hash, feeding the current entropy pool, time and milliseconds since program was opened into this temporary instance to create an intermediate hash. This intermediate hash will then be inputted into the permanent instance(entropy producing version) of slash hash to create the final new entropy pool state.
The security impact of this bug on entropy generation was Moderate - only affects SLASH 4.86
######Enhancements in entropy pool generation######
-
Entropy pool generation now has its own module file, instead of the subroutine being contained in Start.vb(the first form that opens, giving choice between text or file encryption/decryption)
-
The time for entropy generation is now captured as
DateTime.UtcNow
as opposed toDateTime.Now
Backwards compatible encryption/decryption with previous versions of SLASH 4.8x releases.
Please update to SLASH 4.87 due to mentioned security flaw with SLASH 4.86!