Closed bdemers closed 4 years ago
I'm sorry, but we cannot make this change. Tink is all about avoiding asking users for critical input.
On a side note, PASETO should use a randomly generated nonce. Deriving it from the message does not really enhance security against RNG failure, see https://github.com/paragonie/paseto/issues/103.
Thanks for following up (and the link)!
The algorithm used to generate Paseto tokens requires the nonce to be encoded into the token (as well as used to create the cipher text)
See: https://paseto.io/rfc/