| Deutsch English Français Italiano |
|
<e27ab4d6de5838cf9c9c4a8ef65c3155a5d28d08@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail From: Stefan Claas <pollux@tilde.club> Newsgroups: sci.crypt Subject: Re: Using Diceware, BIP39 and leetspeak for Argon2id keys Date: Mon, 19 Aug 2024 19:03:33 -0000 Organization: Ch1ffr3punk5 Message-ID: <e27ab4d6de5838cf9c9c4a8ef65c3155a5d28d08@i2pn2.org> References: <fe80a8e31f3560eaa056f683595dcccfb8a8f8a7@i2pn2.org> <v9tb6n$2euft$6@dont-email.me> <e8fb2ca5aae1ccb493f7cd3a7c4ae00f9107de1d@i2pn2.org> <v9tf44$2fts4$1@dont-email.me> <3d9c7a0df306d40a9d5ef84acb50013bf405384c@i2pn2.org> <v9vnpl$2tcji$1@dont-email.me> <62c76971f611cc49ece1a862850491375aaed1f0@i2pn2.org> <1f74e9f27528d61bc1e1f548f5c41a9181019f46@i2pn2.org> MIME-Version: 1.0 Injection-Date: Mon, 19 Aug 2024 19:03:33 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="3148405"; mail-complaints-to="usenet@i2pn2.org"; posting-account="ieSrCjSDShpZNyqIW52mlwIkg76Hsp+TOOO6KTdfCN8"; User-Agent: flnews/1.3.0pre9 (for GNU/Linux) X-Finger: tilde.club/~pollux/ X-Spam-Checker-Version: SpamAssassin 4.0.0 X-Ed25519-Sig: c30b49917d391f37935361241d1215a9fb56cf7808275a5ce78476a7f61ede6f c71fc4c650945ea1a642fc115e8ad603626b71ebda5a7091bcf202df7ed25702 X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a X-Date: It's Mon 11311 Sep 1993 09:03:33 PM CEST, the September that never ends Bytes: 2416 Lines: 26 Stefan Claas wrote: > BTW. I figured out something IMHO really nice. > > When using my dice2bip program with a '0', for example, as passphrase value > I get the following BIP39 mnemonics: > > $ dice2bip -passphrase 0 > 24-word mnemonic: > grow chronic river sand follow wide spell depth change exclude diet disease around couple buzz domain public addict pave focus top crane glue valid > > And now comes the fun part. > > Feeding this mnemonic into https://iancoleman.io/bip39/ and pressing > the Show entropy details, I have made the '0' 256 bit entropy so to speak > and could theoretically use the hex values as deterministic encryption key. I renamed my dice2bip program, on GitHub, to p2m (password to mnemonic) and it has now a feature added to show the entropy, as hex value, of the mnemonic phrase. This allows one for example to use the mnemonic phrase from a Ledger Hardware Wallet to use as 256 bit encryption key. :-D -- Regards Stefan