-
Notifications
You must be signed in to change notification settings - Fork 5.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
std crypto module in WebAssembly? #3098
Comments
FYI, this is also being discussed in the context of WASI WebAssembly/WASI#65 |
Since this is something related to WASI, there is a related issue:
If Deno supports WASI and if WASI supports cryptography (see comment by @thefliik) then we'll already have cryptography in WASM automatically. Update: |
The performance will likely be much worse than native performance, especially since you lose all hardware features, e.g., hardware-accelerated AES.
Wouldn't "patching V8 to implement CT-Wasm" diminish the portability aspect since the patch would affect platform-specific bytecode generation? Also, time-safety might be the most obvious side attack channel, but there are likely others that would make a WebAssembly implemention insecure. (For example, no memory protection, cache statistics, etc.) |
Isn't this covered by std/hash + WebCrypto (#1891) support? |
Yes, I still feel this is a duplicate of #1891 |
How about building a crypto module entirely implemented in WebAssembly?
Benefits would include: good performance, optimal portability
Luckily, we could also get timing safety for WebAssembly by patching V8 to implement CT-Wasm.
The text was updated successfully, but these errors were encountered: