Deutsch English Français Italiano |
<0f2afef89b1ae010e1dbbe8c4da0bf77f948f6d0@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail From: Stefan Claas <pollux@tilde.club> Newsgroups: sci.crypt Subject: Re: Using Diceware, BIP39 and leetspeak for Argon2id keys Date: Sun, 18 Aug 2024 15:37:28 -0000 Organization: Ch1ffr3punk5 Message-ID: <0f2afef89b1ae010e1dbbe8c4da0bf77f948f6d0@i2pn2.org> References: <fe80a8e31f3560eaa056f683595dcccfb8a8f8a7@i2pn2.org> <20240818su134720@o15.ybtra.de> <5b9051380284857077b8898b1e41bb8ac4bd902e@i2pn2.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=fixed Content-Transfer-Encoding: 8bit Injection-Date: Sun, 18 Aug 2024 15:37:29 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="3019262"; mail-complaints-to="usenet@i2pn2.org"; posting-account="ieSrCjSDShpZNyqIW52mlwIkg76Hsp+TOOO6KTdfCN8"; User-Agent: flnews/1.3.0pre9 (for GNU/Linux) X-Finger: tilde.club/~pollux/ X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a X-Date: It's Sun 11310 Sep 1993 05:37:28 PM CEST, the September that never ends X-Ed25519-Sig: 7c088a1c5e3df965aaa95270c0603ca6070802918f50405c517db8f0a8dfd7fb 26caf3abec09306157a4a69ca1b11484bb89fad1628b511b5b47ba77c260340b X-Spam-Checker-Version: SpamAssassin 4.0.0 Bytes: 3659 Lines: 68 Stefan Claas wrote: > Marcel Logen wrote: > > Stefan Claas in sci.crypt: > > > > > regarding my previous thread about memorizing a 128/256 bit key, > > > I came up with the following idea to create Argon2id keys. > > > > > > Now we only need to memorize our Diceware passphrase. > > > > > > This task shoulb be carried out on an offline Computer. > > > > > > I am using four Golang programs, called dwp (diceware passphrase), > > > dice2bip, leetspeak and argon2id, which you can find on my GitHub > > > page at: > > > > > > https://github.com/stefanclaas/ > > > > > > Usage of leetspeak is optional. > > > > > > First we start with dwp: > > > > > > $ dwp -r 6 -d eff_large_wordlist.txt -p > > > Diceware number 1: 51534 - reselect > > > Diceware number 2: 25455 - envelope > > > Diceware number 3: 42252 - nuptials > > > Diceware number 4: 35561 - lapping > > > Diceware number 5: 26225 - expand > > > Diceware number 6: 24453 - earpiece > > > > > > Complete passphrase: reselect envelope nuptials lapping expand earpiece > > > > Calculated entropy: 77 Bits: > > > > number of positions: 30 (6 x 5) > > character pool: 1..6 > > > > | user15@o15:/tmp$ bc -lq > > | 30 * l(6)/l(2) > > | 77.54887502163468544431 > > > > Quote from <https://en.wikipedia.org/wiki/Diceware>: > > > > | The level of unpredictability of a Diceware passphrase > > | can be easily calculated: each word adds 12.9 bits of > > | entropy to the passphrase [...]. Originally, in 1995, > > | Diceware creator Arnold Reinhold considered five words > > | (64.6 bits) the minimal length needed by average users. > > | However, in 2014 Reinhold started recommending that at > > | least six words (77.5 bits) be used. Ok. now with a russian wordlist and a seperator. Would Eve know that I used another Diceware wordlist, along with BIP39, for creating an Argon2id key ...??? There are a couple of wordlists and one can create his own. $ dwp -r 6 -d russian.txt -p -s "*" Diceware number 1: 41644 - лад Diceware number 2: 13132 - башкир Diceware number 3: 11654 - аполог Diceware number 4: 62335 - ужин Diceware number 5: 56323 - суржа Diceware number 6: 15314 - вагон Complete passphrase: лад*башкир*аполог*ужин*суржа*вагон -- Regards Stefan