Is there a password manager API that I can connect my password manager to?

%3CLINGO-SUB%20id%3D%22lingo-sub-1951315%22%20slang%3D%22en-US%22%3EIs%20there%20a%20password%20manager%20API%20that%20I%20can%20connect%20my%20password%20manager%20to%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1951315%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20a%20password%20manager%20API%20that%20allows%20me%20to%20drop%20in%20my%20own%20password%20storage%20system%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECurrent%20state%20of%20the%20art%20in%20password%20managers%20available%20today%20is%20to%20make%20use%20of%20some%20form%20of%20encryption.%20Unfortunately%20encrypting%20one%20password%20under%20another%20is%20weak%20no%20matter%20how%20you%20try%20and%20public%20key%20has%20been%20considered%20impractical%20because%20of%20the%20key%20distribution%20problem.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20solution%20that%20I%20have%20been%20working%20on%20for%20the%20past%20five%20years%20is%20to%20apply%20threshold%20cryptography%2C%20a%20form%20of%20public%20key%20cryptography%20in%20which%20private%20keys%20are%20split%20allowing%20creation%20of%20additional%20roles.%20This%20approach%20has%20recently%20gained%20wider%20attention%20in%20IETF%2FIRTF%20and%20at%20NIST.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20make%20use%20of%20public%20key%20cryptography%20we%20use%20a%20PKI.%20To%20make%20use%20of%20Threshold%20Cryptography%2C%20we%20need%20a%20Threshold%20Key%20Infrastructure%20which%20is%20what%20I%20have%20built%20-%20the%20Mathematical%20Mesh.%20The%20Mesh%20makes%20it%20really%20easy%20to%20provision%20and%20manage%20private%20keys%2C%20so%20easy%20that%20most%20users%20will%20never%20be%20aware%20that%20they%20are%20even%20doing%20it.%20All%20the%20user%20needs%20to%20do%20is%20perform%20a%20simple%20one%20time%20connection%20operation%20and%20all%20their%20devices%20are%20joined%20together%20to%20form%20their%20personal%20mesh.%20Data%20can%20then%20flow%20between%20the%20devices%20with%20true%20end%20to%20end%20security.%20A%20Mesh%20service%20cannot%20suffer%20a%20confidentiality%20breach%20unless%20AES256%20or%20X448%20are%20broken%20because%20Mesh%20services%20do%20not%20have%20any%20form%20of%20access%20to%20the%20plaintext.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOne%20obvious%20application%20for%20the%20Mesh%20is%20to%20provide%20a%20true%20end-to-end%20secure%20password%20manager.%20Once%20Alice%20has%20connected%20her%20phone%2C%20desktop%20and%20tablet%20and%20uses%20a%20Mesh%20capable%20Web%20browser%20on%20each%2C%20she%20can%20start%20to%20use%20secure%20machine%20generated%2C%20128%20bit%20work%20factor%20passwords%20because%20she%20will%20never%20have%20to%20remember%20them%20or%20type%20them%20in.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIf%20a%20device%20is%20lost%2C%20it%20can%20be%20disabled%20without%20affecting%20any%20other%20device.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUnlike%20other%20password%20managers%2C%20the%20Mesh%20also%20supports%20PKI%20based%20alternatives.%20Every%20device%20that%20can%20access%20the%20password%20vault%20can%20also%20perform%20public%20key%20authentication.%20The%20Mesh%20also%20provides%20a%20second%20factor%20authentication%20system.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20code%20is%20all%20open%20source%20(C%23)%2C%20MIT%20license.%20Anyone%20can%20set%20up%20a%20Mesh%20service%20and%20Mesh%20users%20can%20change%20their%20service%20provider%20at%20any%20time%20with%20zero%20switching%20cost.%20The%20specs%20are%20all%20submitted%20as%20Internet%20Drafts.%20As%20a%20member%20of%20the%20original%20CERN%20team%20that%20designed%20the%20Web%2C%20I%20am%20replaying%20the%20same%20deployment%20strategy.%20The%20short%20term%20objective%20being%20to%20produce%20a%20proof%20of%20concept%20demo%2C%20preferably%20as%20a%20browser%20extension%20but%20failing%20that%20produce%20a%20new%20browser%20distro%20being%20a%20minimal%20extension%20of%20something%20else.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20is%20a%20platform%20play%2C%20the%20goal%20being%20to%20get%20the%20technology%20into%20every%20browser%20as%20part%20of%20the%20core.%3C%2FP%3E%3C%2FLINGO-BODY%3E
New Contributor

Is there a password manager API that allows me to drop in my own password storage system?

 

Current state of the art in password managers available today is to make use of some form of encryption. Unfortunately encrypting one password under another is weak no matter how you try and public key has been considered impractical because of the key distribution problem.

 

The solution that I have been working on for the past five years is to apply threshold cryptography, a form of public key cryptography in which private keys are split allowing creation of additional roles. This approach has recently gained wider attention in IETF/IRTF and at NIST.

 

To make use of public key cryptography we use a PKI. To make use of Threshold Cryptography, we need a Threshold Key Infrastructure which is what I have built - the Mathematical Mesh. The Mesh makes it really easy to provision and manage private keys, so easy that most users will never be aware that they are even doing it. All the user needs to do is perform a simple one time connection operation and all their devices are joined together to form their personal mesh. Data can then flow between the devices with true end to end security. A Mesh service cannot suffer a confidentiality breach unless AES256 or X448 are broken because Mesh services do not have any form of access to the plaintext.

 

One obvious application for the Mesh is to provide a true end-to-end secure password manager. Once Alice has connected her phone, desktop and tablet and uses a Mesh capable Web browser on each, she can start to use secure machine generated, 128 bit work factor passwords because she will never have to remember them or type them in. 

 

If a device is lost, it can be disabled without affecting any other device.

 

Unlike other password managers, the Mesh also supports PKI based alternatives. Every device that can access the password vault can also perform public key authentication. The Mesh also provides a second factor authentication system.

 

The code is all open source (C#), MIT license. Anyone can set up a Mesh service and Mesh users can change their service provider at any time with zero switching cost. The specs are all submitted as Internet Drafts. As a member of the original CERN team that designed the Web, I am replaying the same deployment strategy. The short term objective being to produce a proof of concept demo, preferably as a browser extension but failing that produce a new browser distro being a minimal extension of something else.

 

This is a platform play, the goal being to get the technology into every browser as part of the core.

0 Replies