I'm not sure I follow you. You should be storing the master password in one table, and their other passwords in another table. The master password would be the cipher password, but it wouldn't need to be stored more than once. They would need to enter their master password to retrieve a password which is how most password managers work.^ That's the problem - it would mean storing the same passwords X times, where X is the number of users of the password manager. Seems like it would be counter productive?
I'm not a developer or a coder though so I'm coming from a sysadmin/user angle more than anything.
No? Most symmetric encryption algorithms use 256-bit keys (Camellia too). AES-256 and Camellia-256 are widely used in SSL/TLS.Isn't a AES-256 a bit to easy?
There's no AES-512... if you roll your own 512-bit scheme based on AES, you still can't just call it AES.Personally I would use 512-bit, currently 256-bit is believed to be sufficient. However if history is taught us something its that CPU power is always increasing. Even if we cant fathom it right now, its possible we just need the right technology to facilitate it. Using 512-bit keys costs you little, gains you a decent benefit.