ARC-76: Password Account Source

Password account using PBKDF2

AuthorLudovit Scholtz
Discussions-Tohttps://github.com/algorandfoundation/ARCs/issues/208
StatusFinal
TypeStandards Track
CategoryCore
Created2023-06-12

Abstract

This standard specifies a computation for seed bytes for Password Account. For general adoption it is better for people to remember passphrase than mnemonic. With this standard person can hash the passphrase and receive the seed bytes for X25529 algorand account.

Motivation

By providing a clear and precise computation process, Password Account empowers individuals to effortlessly obtain their seed bytes for algorand account. In the realm of practicality and widespread adoption, the standard highlights the immense advantages of utilizing a passphrase rather than a mnemonic. Remembering a passphrase becomes the key to unlocking a world of possibilities. With this groundbreaking standard, individuals can take control of their X25529 Algorand account by simply hashing their passphrase and effortlessly receiving the corresponding seed bytes. It’s time to embrace this new era of accessibility and security, empowering yourself to reach new heights in the world of Password Accounts. Let this standard serve as your guiding light, motivating community to embark on a journey of limitless possibilities and unparalleled success.

This standard seek the synchronization between wallets which may provide password protected accounts.

Specification

Seed bytes generation is calculated with algorithm:

      const init = `ARC-0076-${password}-{slotId}-PBKDF2-999999`;
      const salt = `ARC-0076-{slotId}-PBKDF2-999999`;
      const iterations = 999999;
      const cryptoKey = await window.crypto.subtle.importKey(
        "raw",
        Buffer.from(init, "utf-8"),
        "PBKDF2",
        false,
        ["deriveBits", "deriveKey"]
      );
      const masterBits = await window.crypto.subtle.deriveBits(
        {
          name: "PBKDF2",
          hash: "SHA-256",
          salt: Buffer.from(salt, "utf-8"),
          iterations: iterations,
        },
        cryptoKey,
        256
      );

      const uint8 = new Uint8Array(masterBits);
      const mnemonic = algosdk.mnemonicFromSeed(uint8);
      const genAccount = algosdk.mnemonicToSecretKey(mnemonic);

Length of the data section SHOULD be at least 16 bytes long.

Slot ID is account iteration. Default is “0”.

Email Password account

Email Password account is account generated from the original data

      const init = `ARC-0076-${email}-${password}-{slotId}-PBKDF2-999999`;
      const salt = `ARC-0076-${email}-{slotId}-PBKDF2-999999`;

The email part can be published to the service provider backend and verified by the service provider. Password MUST NOT be transfered over the network.

Length of the password SHOULD be at least 16 bytes long.

Sample data

This sample data may be used for verification of the ARC-0076 implementation.

const email = "email@example.com";
const password = "12345678901234567890123456789012345678901234567890";
const slotId = "0";
const init = `ARC-0076-${email}-${password}-{slotId}-PBKDF2-999999`;
const salt = `ARC-0076-${email}-{slotId}-PBKDF2-999999`;

Results in:

masterBits = [225,7,139,154,245,210,181,138,188,129,145,53,246,184,243,88,163,163,109,208,77,71,7,235,81,244,129,215,102,168,105,21]
account.addr = "5AHWQJ5D52K4GRW4JWQ5GMR53F7PDSJEGT4PXVFSBQYE7VXDVG3WSPWSBM"

Rationale

This standard was designed to allow the wallets to provide password protected accounts which does not require general population to store the mnemonic. Email extension allows service providers to bind specific account with the email address, and user experience to feel the basic authentication form with email and password they are already used to from web2 usecases.

Backwards Compatibility

We expect future extensions to be compatibile with Password account. The hash mechanism for the future algorighms should be suffixed such as -PBKDF2-999999.

Security Considerations

This standard moves the security of strength of the account to how user generates the password.

This standard relies on randomness and collision resistance of PBKDF2 and ‘SHA-256’. User MUST be informed about the risks associated with this type of account.

Copyright and related rights waived via CCO.

Citation

Please cite this document as:

Ludovit Scholtz, "ARC-76: Password Account," Algorand Requests for Comments, no. 76, June 2023. [Online serial]. Available: https://github.com/algorandfoundation/ARCs/blob/main/ARCs/arc-0076.md.