| Deutsch English Français Italiano |
|
<5b9051380284857077b8898b1e41bb8ac4bd902e@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail From: Stefan Claas <pollux@tilde.club> Newsgroups: sci.crypt Subject: Re: Using Diceware, BIP39 and leetspeak for Argon2id keys Date: Sun, 18 Aug 2024 14:35:51 -0000 Organization: Ch1ffr3punk5 Message-ID: <5b9051380284857077b8898b1e41bb8ac4bd902e@i2pn2.org> References: <fe80a8e31f3560eaa056f683595dcccfb8a8f8a7@i2pn2.org> <20240818su134720@o15.ybtra.de> MIME-Version: 1.0 Injection-Date: Sun, 18 Aug 2024 14:36:14 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="3013593"; mail-complaints-to="usenet@i2pn2.org"; posting-account="ieSrCjSDShpZNyqIW52mlwIkg76Hsp+TOOO6KTdfCN8"; User-Agent: flnews/1.3.0pre9 (for GNU/Linux) X-Spam-Checker-Version: SpamAssassin 4.0.0 X-Ed25519-Sig: b504e61a14ba6d1abb155e97de90e364cee1f20bb924abcbee8c72bc8bc08109 ac3969700338487f3fe2b3c78c1a1f3f4b92033b95139f8b8bb58c1f4c475a0b X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a X-Finger: tilde.club/~pollux/ X-Date: It's Sun 11310 Sep 1993 04:35:51 PM CEST, the September that never ends Bytes: 3660 Lines: 76 Marcel Logen wrote: > Stefan Claas in sci.crypt: > > > regarding my previous thread about memorizing a 128/256 bit key, > > I came up with the following idea to create Argon2id keys. > > > > Now we only need to memorize our Diceware passphrase. > > > > This task shoulb be carried out on an offline Computer. > > > > I am using four Golang programs, called dwp (diceware passphrase), > > dice2bip, leetspeak and argon2id, which you can find on my GitHub > > page at: > > > > https://github.com/stefanclaas/ > > > > Usage of leetspeak is optional. > > > > First we start with dwp: > > > > $ dwp -r 6 -d eff_large_wordlist.txt -p > > Diceware number 1: 51534 - reselect > > Diceware number 2: 25455 - envelope > > Diceware number 3: 42252 - nuptials > > Diceware number 4: 35561 - lapping > > Diceware number 5: 26225 - expand > > Diceware number 6: 24453 - earpiece > > > > Complete passphrase: reselect envelope nuptials lapping expand earpiece > > Calculated entropy: 77 Bits: > > number of positions: 30 (6 x 5) > character pool: 1..6 > > | user15@o15:/tmp$ bc -lq > | 30 * l(6)/l(2) > | 77.54887502163468544431 > > Quote from <https://en.wikipedia.org/wiki/Diceware>: > > | The level of unpredictability of a Diceware passphrase > | can be easily calculated: each word adds 12.9 bits of > | entropy to the passphrase [...]. Originally, in 1995, > | Diceware creator Arnold Reinhold considered five words > | (64.6 bits) the minimal length needed by average users. > | However, in 2014 Reinhold started recommending that at > | least six words (77.5 bits) be used. > > [...] > > > Our final result: b3ff9d34181c4771dd9ec993c78b2d5b2cc809024c9447f97468893f0d70e611 > > This result has an entropy of 77 Bits, too. IMHO. > > Not 256 Bits, as you might think, as reshaping doesn't > add any amount of entropy, AFAIR. You left out the important step of BIP39 usage, prior generating the final key. My BIP39 program accepts any strings, not only diceware passphrases. Let alone leetspeak usage, so that Eve would never figure out what combination was used. People might argue that this is security by obsurity, which I do not think, because it is made public, for discussion and I also strongly believe that through BIP39 usage the entropy is much more to generate a 256 bit Argon2id key. The way you IMHO calculate the entropy, with bc, is not what public entropy calculators do. -- Regards Stefan