-
Basically the same as V001 but adopt iteration count recommendation from OWASP. Could potentially also implement U002 as well for older devices. See previous comment on this in #1378 (comment) I have an experimental version implemented in Python at clach04/jenc-py#7 NOTE as expected it is slower to encrypt/decrypt (well, slow KDF, actually encryption/decryption time is the same). From initial implementation. Before V002 Python https://github.com/clach04/jenc-py/ test suite run time under
With V002 and 210K iterations instead of 10K, about 1.6 secs:
If this is adopted, older Markor installation will NOT be able to opened newer Markor encrypted files. Thoughts? |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 5 replies
-
Regardless if it's a different algorithm or different revision...not a good idea to immediate make the new one by default, and break all other installations that don't support it yet. So if it has to be a new revision, the existing implementation should still be the default - but be able to read both.
What is most important is that it not makes Markor extreme slow in real use. Do you notice a notable difference/slowdown? |
Beta Was this translation helpful? Give feedback.
-
I still do not have an android build (even though, I've written the code 😆). What I have done is implement some testing with a desktop/command-line, python implementation. This implementation is single-threaded, it does NOT attempt to do anything in parallel. I ran the tests at least 3 times ('cos this is supposed to be a fun project). I have an SSD and I will ignore the first run so as to not test disk-IO timing, and instead focus on the CPU processing time. I have essentially done 2 benchmarks with 4 different encryption implementations (2 jenc).
The benchmark searches both the plain text and the encrypted files so one can argue that case 2 above is not solely testing crypto impact, but it matches my real use cases :-) Stats for 2:
Results - 1Results 1 - Raw
(py3.12.5venv) C:\code\puren_tonbo>ptgrep -p password --time --search_encrypted does_not_exist C:\code\notes\10000-markdown-files\10k_v001_jenc
Results 1 - Summary
Results - 2Results 2 - Raw
(py3.12.5venv) C:\tmp\work_notes>ptgrep --time --search_encrypted really_does_not_exist tombo
Results 1 - Summary
Background NotesI used a new feature in puren_tonbo to generate the test data, there is a new tool for bulk converting files: For 10K notes:
For my notes: Copy tombo folder a few times and name using dirs below, re-encrypt in-place:
|
Beta Was this translation helpful? Give feedback.
-
@gsantner have you ever thought about adding plugin support to markor? |
Beta Was this translation helpful? Give feedback.
Regardless if it's a different algorithm or different revision...not a good idea to immediate make the new one by default, and break all other installations that don't support it yet.
So if it has to be a new revision, the existing implementation should still be the default - but be able to read both.
When a while has passed, we can always think on defaulting to the new. At this point older and newer installations/tools alike support both.
What is most important is that it not makes Markor extreme slow in real use. Do you notice a notable difference/slowdown?