I agree that salts already give very good security on their own (even if I personally like the idea of adding peppers), and it’s entirely possible that I’m underestimating the difficulty of implementing it. I also agree that using secrecy assumptions is bad (that’s my problem with the first method, which is fully based on secrecy and becomes useless if the secret is revealed).
My main curiosity here is how does my method compare to the usual ones. Since, if we take the secrecy example, mine doesn’t depend on secrecy (unlike #1, like #2) but still benefits from it (like #1, unlike #2).
I agree that salts already give very good security on their own (even if I personally like the idea of adding peppers), and it’s entirely possible that I’m underestimating the difficulty of implementing it. I also agree that using secrecy assumptions is bad (that’s my problem with the first method, which is fully based on secrecy and becomes useless if the secret is revealed).
My main curiosity here is how does my method compare to the usual ones. Since, if we take the secrecy example, mine doesn’t depend on secrecy (unlike #1, like #2) but still benefits from it (like #1, unlike #2).